Preferred Language
Articles
/
uxYY0osBVTCNdQwCVuCt
The Effect of Wavelet Coefficient Reduction on Image Compression Using DWT and Daubechies Wavelet Transform
...Show More Authors

FG Mohammed, HM Al-Dabbas, Science International, 2018 - Cited by 2

View Publication
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Chaos-based Color Image Steganography Method Using 3 D Cat Map
...Show More Authors

     Steganography is a technique to hide a secret message within a different multimedia carrier so that the secret message cannot be identified. The goals of steganography techniques include improvements in imperceptibility, information hiding, capacity, security, and robustness. In spite of numerous secure methodologies that have been introduced, there are ongoing attempts to develop these techniques to make them more secure and robust. This paper introduces a color image steganographic method based on a secret map, namely 3-D cat. The proposed method aims to embed data using a secure structure of chaotic steganography, ensuring better security. Rather than using the complete image for data hiding, the selection of

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Estimation of Extract Yield and Mass Transfer Coefficient in Solvent Extraction of Lubricating Oil
...Show More Authors

An investigation was conducted to suggest relations for estimating yield and properties of the improved light lubricating oil fraction produced from furfural extraction process by using specified regression.

Mass transfer in mixer-settler has been studied. Mass transfer coefficient of continuous phase, mass transfer coefficient of dispersed phase and the overall mass transfer coefficient extraction of light lubes oil distillate fraction by furfural are calculated in addition to all physical properties of individual components and the extraction mixtures.

The effect of extraction variables were studied such as extraction temperature which ranges from 70 to 110°C and solvent to oil ratio which ranges from 1:1 to 4:1 (wt/wt

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
International Journal Of Image And Data Fusion
Image edge detection operators based on orthogonal polynomials
...Show More Authors

View Publication
Scopus (32)
Crossref (10)
Scopus Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Image Encryption Based on Intelligent Session Mask Keys
...Show More Authors

The revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 05 2022
Journal Name
Sensors
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption
...Show More Authors

Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Engineering
ESTIMATION OF RELATIONSHIP BETWEEN COEFFICIENT OF CONSOLIDATION AND LIQUID LIMIT OF MIDDLE AND SOUTH IRAQI SOILS
...Show More Authors

In this paper, a relationship between the liquid limit and the coefficient of consolidation of Iraqi soils are studied. The samples of soil used in study are undisturbed silty clay. These samples are taken from different locations and depths of Middle and South of Iraq by cooperation with Consulting Engineering Bureau- University of Baghdad- College of Engineering. The depth reached about 20 meters. The experimental work is made to calculate the liquid limit and the coefficient of consolidation. From these sites, 280 points are obtained. The relationship between the liquid limit and the coefficient of consolidation is drawn as a curve. This curve is studied and compared with the curve that obtained from other studies. From these curves, it

... Show More
Preview PDF
Publication Date
Sat Jan 11 2025
Journal Name
Modern Sport
The effect of Developing special endurance using multiple round periods on some physical and functional indicators for elite boxers
...Show More Authors

View Publication Preview PDF
Publication Date
Wed May 31 2023
Journal Name
Iraqi Geological Journal
Studying the Effect of Permeability Prediction on Reservoir History Matching by Using Artificial Intelligence and Flow Zone Indicator Methods
...Show More Authors

The map of permeability distribution in the reservoirs is considered one of the most essential steps of the geologic model building due to its governing the fluid flow through the reservoir which makes it the most influential parameter on the history matching than other parameters. For that, it is the most petrophysical properties that are tuned during the history matching. Unfortunately, the prediction of the relationship between static petrophysics (porosity) and dynamic petrophysics (permeability) from conventional wells logs has a sophisticated problem to solve by conventional statistical methods for heterogeneous formations. For that, this paper examines the ability and performance of the artificial intelligence method in perme

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 27 2020
Journal Name
Journal Of The College Of Education For Women
The Effect of Using Online Automated Feedback on Iraqi EFL Learners’ Writings at University Level
...Show More Authors

Feedback on students’ assignments can be done in many different ways. Nowadays, the growing number of students at universities has increased the burden on the instructors to give feedback on students’ writings quickly and efficiently. As such, new methods of modern online automated feedback tools, such as Hemingway app and ecree,are used to assist and help instructors. Hence, this research is an explanatory study to examine the effect of using the online automated feedback on some Iraqi EFL learners’ writings at the university level. The study comprised 60 students enrolled in an English language course at the University of Anbar. They were divided randomly into two groups, experi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref