Preferred Language
Articles
/
rRZ_l4cBVTCNdQwC1VfG
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is preprocessed and transform of into some intermediate form which can be compressed with better efficiency and security. This solves some problems relevant to the common encryption methods which generally manipulate an entire data set, most encryption algorithms tend to make the transfer of information more costly in terms of time and sometimes bandwidth.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Mar 28 2021
Journal Name
Journal Of The College Of Education For Women
A Critical Discourse Analysis of Martin Crimp’s Piece “Advice to Iraqi Women”: عفراء عبد الحسين ناصر , سراب خليل
...Show More Authors

Language is a vehicle for social values and ideologies that a man intends or attempts to express. Dramatic texts are one of the discursive practices that embody values and ideologies. What is expressed in dramatic text is deliberate because it is meant to affect other’s values, trends and ideologies in one way or another. Such ideologies and values are not explicit. To bring them out requires putting language under scrutiny to unveil what is implied. The present study attempts to analyze a dramatic script entitled Advice to Iraqi Women by the British playwright Martin Crimp in an attempt to unveil the intended political ideologies underlying the text. The title reflects a political aspect embedded in the word “Iraqi” that

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Nov 30 2016
Journal Name
International Business Management
ESTIMATE OF THE MULTIPLIER EFFECT OF THE MONETARY AND FISCAL POLICY ON NON-OIL GROSS DOMESTIC PRODUCT IN THE IRAQI ECONOMY FOR THE PERIOD OF 1990-2014
...Show More Authors

The monetary policy is a vital method used in implementing monetary stability through: the management of income and adjustment of the price (monetary targets) in order to promote stability and growth of real output (non-cash goals); the tool of interest rate and direct investment guides or movement towards the desired destination; and supervisory instruments of monetary policy in both quantitative and qualitative. The latter is very important as a standard compass to investigate the purposes of the movement monetary policy in the economy. The public and businesses were given monetary policy signals by those tools. In fiscal policy, there are specific techniques to follow to do the spending and collection of revenue. This is done in order to

... Show More
Preview PDF
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl
...Show More Authors

It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL).
This HDL program is then used to configure an FPGA to implement the designed circuit.

View Publication Preview PDF
Crossref
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On SAH – Ideal of BH – Algebra
...Show More Authors

     The aim of this investigation is to present the idea of  SAH – ideal , closed SAH – ideal and closed SAH – ideal with respect to an element ,  and s-  of BH – algebra .

We detail and show  theorems which regulate the relationship between these ideas and provide some examples in BH – algebra .

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
On Fully (m,n)-stable modules relative to an ideal A of
...Show More Authors

Let R be a commutative ring with non-zero identity element. For two fixed positive integers m and n. A right R-module M is called fully (m,n) -stable relative to ideal A of , if for each n-generated submodule of Mm and R-homomorphism . In this paper we give some characterization theorems and properties of fully (m,n) -stable modules relative to an ideal A of . which generalize the results of fully stable modules relative to an ideal A of R.

View Publication Preview PDF
Crossref
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Analyzing Laser Speckle Pattern Using the Discrete Cosine Transform
...Show More Authors

The use of Cosine transform to analyze the model-noise pattern alteration with different vibration model applied on multimode fiber optics are studied. It's results compared with the Fourier transform to perform the same analysis using total frequency difference and the computation time, which almost coincide for the both transforms. A discussion for the results and recommendation are introduced.

View Publication Preview PDF
Publication Date
Fri Jul 18 2014
Journal Name
International Journal Of Computer Applications
3-Level Techniques Comparison based Image Recognition
...Show More Authors

Image recognition is one of the most important applications of information processing, in this paper; a comparison between 3-level techniques based image recognition has been achieved, using discrete wavelet (DWT) and stationary wavelet transforms (SWT), stationary-stationary-stationary (sss), stationary-stationary-wavelet (ssw), stationary-wavelet-stationary (sws), stationary-wavelet-wavelet (sww), wavelet-stationary- stationary (wss), wavelet-stationary-wavelet (wsw), wavelet-wavelet-stationary (wws) and wavelet-wavelet-wavelet (www). A comparison between these techniques has been implemented. according to the peak signal to noise ratio (PSNR), root mean square error (RMSE), compression ratio (CR) and the coding noise e (n) of each third

... Show More
View Publication
Crossref
Publication Date
Mon Sep 16 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Techniques of Watermark Images using Bit Plane Slicing and Cubic-spline Interpolation
...Show More Authors

A watermark is a pattern or image defined in a paper that seems as different shades of light/darkness when viewed by the transmitted light which used for improving the robustness and security. There are many ways to work Watermark, including the addition of an image or text to the original image, but in this paper was proposed another type of watermark is add curves, line or forms have been drawn by interpolation, which produces watermark difficult to falsify and manipulate it. Our work suggests new techniques of watermark images which is embedding Cubic-spline interpolation inside the image using Bit Plane Slicing. The Peak to Signal Noise Ratio (PSNR) and Mean Square Error (MSE) value is calculated so that the quality of the original i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 26 2024
Journal Name
Jbpml
Studying The Changes in Motility and Morphology on Human sperm after exposure to low doses of x-rays
...Show More Authors

the energy that a radiation source emits as light (photons), electromagnetic waves, or particles is known as radiation. X-ray is one type of ionizing radiation that falls within the electromagnetic wave category of short wavelengths. Because of their short wavelength. X-ray is a type of ionizing radiation that is used in a constantly growing number of diagnostic procedures. X-ray diagnostic imaging has been employed in the medical field for more than a century(Hariyoto et al., 2020). Radiation has advantages for human health, but there is also a risk. the impacts of Radiation on Fertility it is an oligospermia, or a reduction in the number of sperm cells, which is already possible after radiation exposure of 0.15 mGy. It Leads to impede

... Show More
Publication Date
Wed Oct 25 2023
Journal Name
College Of Islamic Sciences
The rule (it is desirable to leave the dispute) and its importance in the life of a Muslim
...Show More Authors

Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of Messengers, and upon his family and companions

And whoever follows his guidance until the Day of Judgment. As for what follows: Islamic law commands Muslims to unite, reject disagreement, and not dispute, and to spread the spirit of tolerance and love among them. God Almighty said: “And hold fast to the rope of God all of you and do not become divided, and remember the favor of God upon you when you are enemies and He has joined your hearts.” So, by His grace, you became brothers (1), and He said: (And You will be like those who became divided and disagreed after the clear proofs had come to them. It is they - for them is a great punishment.) (2

... Show More
View Publication Preview PDF