Preferred Language
Articles
/
uBYU0osBVTCNdQwCpuCq
Application of WDR Technique with different Wavelet Codecs for Image Compression

FG Mohammed, HM Al-Dabbas, Iraqi journal of science, 2018 - Cited by 6

Scopus
View Publication
Publication Date
Fri Aug 05 2016
Journal Name
International Journal Of Advances In Scientific Research And Engineering
Image Encryption Using Modified AES with Bio-Chaotic

Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.

View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Co-digestion of Shumblan with Different Wastes as a Source for the Biogas Production

Shumblan (SH) is one of the most undesirable aquatic plants widespread in the irrigation channels and water bodies. This work focuses on boosting the biogas potential of shumblan by co-digesting it with other types of wastes without employing any chemical or thermal pretreatments as done in previous studies. A maximum biogas recovery of 378 ml/g VS was reached using shumblan with cow manure as inoculum in a ratio of 1:1. The methane content of the biogas was 55%. Based on volatile solid (VS) and C/N ratios, biogas productions of 518, 434, and 580 ml/g VS were obtained when the shumblan was co-digested with food wastes (SH:F), paper wastes (SH:P), and green wastes (SH:G) respectively. No significant changes of methane contents were observ

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Fri Feb 01 2013
Journal Name
Journal Of Applied Research And Technology
Scopus (90)
Crossref (86)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Feb 13 2020
Journal Name
International Journal Of Environmental Research
Synthesis of a Novel Composite Sorbent Coated with Siderite Nanoparticles and its Application for Remediation of Water Contaminated with Congo Red Dye
Abstract

Re-use of the byproduct wastes resulting from different municipal and industrial activities in the reclamation of contaminated water is real application for green projects and sustainability concepts. In this direction, the synthesis of composite sorbent from the mixing of waterworks and sewage sludge coated with new nanoparticles named “siderite” (WSSS) is the novelty of this study. These particles can be precipitated from the iron(II) nitrate using waterworks sludge as alkaline agent and source of carbonate. Characterization tests using X-ray diffraction (XRD), scanning electron microscopy (SEM) and energy dispersive spectroscopy (EDS) mapping revealed that the coating process was c

... Show More
Scopus (34)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Formation Silver Nanoparticles of Different Size Using Different Reductants with AgNO3 Solution

In this study, silver nanoparticles (AgNPs) are synthesized using different chemical routes to obtain different sizes and shapes of nanoparticles by colloid chemistry with using stabilizing and reducing agent, which make them interesting for variety of physical applications. The morphology and structure of the synthesized AgNPs were characterized by UV-VIS spectra, Scanning Electron Microscopy (SEM) and Zeta potential to demonstrate that different sizes and shapes can by synthesized by different reductants in the presence of various stabilizing agents.

View Publication Preview PDF
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
EfficientEfficientEfficientEfficientEfficientEfficientEfficientEfficientEfficient text in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the cov

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 29 2021
Journal Name
Iraqi Journal Of Science
The Effect of Using Inter-Frame Coding with Jpeg to Improve the Compression of Satellite Images

Many recent satellite image compression methods depends on removing the spectral and spatial redundancies within image only , such these methods known as intra-frame(image) coding such as predictive and transformed based techniques , but these contributions needs a hard work in order to improve the compression performance also most of them are applied on individual data. The other trend is to exploit the temporal redundancy between the successive satellite images captured for the same area from different views, different sensors, or at different times, which will be much correlated and removing this redundancy will improve the compression performance and this principle known as inter-frame(image) coding .In this paper, a latest powerful

... Show More
Crossref
View Publication Preview PDF