Preferred Language
Articles
/
wxghOZgBVTCNdQwC_LqA
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the Lyapunov exponents, fractal dimension, and bifurcation diagrams. Furthermore, an algorithm is suggested to generate a random binary key, serving as the controller for the embedding process. And the randomness of the generated key was checked. Moreover, this paper introduces a technique that utilizes the generated random key to govern both the embedding process in the spatial domain and the frequency domain. The results of this study are promising and its potential applications can be extended to various fields that require discreet communication and robust data protection

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Al-wakidi as a documentary historian
...Show More Authors

This research is about the resources and the way of al-Waqidi in his
researching of al-sira of the Prophet. And what happened in the first of Islam.
This research is about the documents which al-Waqidi had it. Some of it,
which he had visited, was the places, especially the periods which the events had took
place in. He was asking those whom were contemporary to the happenings, from the
sons of al-Sahaba and al-Tabi’een.
Also this research is lightening on the new studies that gave this historian a
good respect during his work, in which he could gave the reality about his authorship.
The research is trying to draw real way of al-Waqidi and what were reported by him,
especially the documents, and what he had s

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
Neural Networks as a Discriminant Purposes
...Show More Authors

Discriminant between groups is one of the common procedures because of its ability to analyze many practical phenomena, and there are several methods can be used for this purpose, such as linear and quadratic discriminant functions. recently, neural networks is used as a tool to distinguish between groups.

In this paper the simulation is used to compare neural networks and classical method for classify observations to group that is belong to, in case of some variables that don’t follow the normal distribution. we use the proportion of number of misclassification observations to the all observations as a criterion of comparison.  

 

 

View Publication Preview PDF
Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Imagination as a Path to Reality
...Show More Authors

Imagination as a Path to Reality

View Publication Preview PDF
Publication Date
Mon Feb 21 2022
Journal Name
Научный форум: Филология, искусствоведение и культурология: сб. ст. по материалам Lvi междунар. науч.-практ. конф. – No 2 (56). – М
Comparative analysis of zoomorphic metaphors in Russian and Arabic as a method for studying linguoculturology
...Show More Authors

: zonal are included in phraseological units, form metaphorical names for a person, give him various emotional and evaluative characteristics. This article examines the topic of zoomorphic metaphors that characterize a person in the Russian and Arabic languages in the aspect of their comparative analysis, since the comparative analysis of the metaphorical meanings of animalisms is an important method for studying cultural linguistics, since zoomorphic metaphors are a reflection of culture in a language.

Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Engineering
Digital Color Image Watermarking Using Encoded Frequent Mark
...Show More Authors

With the increased development in digital media and communication, the need for methods to protection and security became very important factor, where the exchange and transmit date over communication channel led to make effort to protect these data from unauthentication access.

This paper present a new method to protect color image from unauthentication access using watermarking. The watermarking algorithm hide the encoded mark image in frequency domain using Discrete Cosine Transform. The main principle of the algorithm is encode frequent mark in cover color image. The watermark image bits are spread by repeat the mark and arrange in encoded method that provide algorithm more robustness and security. The propos

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Journal Of Engineering Science And Technology
NUMERICAL SIMULATION OF SHEET PILES AS A SEEPAGE CUTTER OFF: AL-KIFIL REGULATOR AS A CASE STUDY
...Show More Authors

Sheet piles are necessary with hydraulic structures as seepage cut-off to reduce the seepage. In this research, the computational work methodology was followed by building a numerical model using Geo-Studio program to check the efficiency of using concrete sheet piles as a cut-off or reducer for seepage with time if the sheet piles facing the drawdown technique. Al-Kifil regulator was chosen as a case study, an accurate model was built with a help of observed reading of the measuring devices, which was satisfactory and helped in checking the sheet piles efficiency. Through the study, three scenarios were adopted (with and without) drawdown technique, it was found that at the short time there's no effect of the drawdown technique on

... Show More
View Publication
Scopus
Publication Date
Fri Mar 12 2021
Journal Name
Medico Legal Update
Human Cytomegalovirus Infection as a Risk Factor for Type 2 Diabetes Mellitus Development in a Sample of Iraqi Patients
...Show More Authors

Type 2 diabetes mellitus which abbreviate as T2DM is a complex endocrine and metabolic disorder arisingfrom genetic and environmental factors interaction which in turn induce various degrees of insulin functionalalteration on peripheral tissues. Globally, T2DM has develop into a public health problem. Therefore, Thestudy included (75) patients(37 female and 38 males) suffering from T2DM who visit al-kadhimiya teachinghospital with age range 20-80 years and (70) as healthy controls with age range 20-70 years. All studiedgroups were evaluated CMV IgG by ELISA,B. urea, S. Creatinine, cholesterol and triglyceride the resultsshowed that B.urea, S.creatinine and serum cholesterol showed a non-significant differences between studiedgroup,

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
The Necessary and Sufficient Optimality Conditions for a System of FOCPs with Caputo–Katugampola Derivatives
...Show More Authors

The necessary optimality conditions with Lagrange multipliers  are studied and derived for a new class that includes the system of CaputoKatugampola fractional derivatives to the optimal control problems with considering the end time free. The formula for the integral by parts has been proven for the left CaputoKatugampola fractional derivative that contributes to the finding and deriving the necessary optimality conditions. Also, three special cases are obtained, including the study of the necessary optimality conditions when both the final time  and the final state  are fixed. According to convexity assumptions prove that necessary optimality conditions are sufficient optimality conditions.

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Pharmacy Research
Pulsatile drug delivery system - A review article
...Show More Authors

Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More