Preferred Language
Articles
/
yhY5mYcBVTCNdQwCGFen
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the produced key is used to determine the starting pixel in each block for hiding and the direction of hiding (clockwise or anticlockwise). The proposed method is applied on many images with different embedding rate, and many metrics are used to evaluate the performance of the proposed method such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), correlation factor (CF) and Structural Similarity Index Measure (SSIM). It achieves in average 52.225 dB of PSNR, 0.3215 of MSE, 0.9952 of SSIM and 0.9997 of CF with embedding rate 1.5.

Scopus Crossref
Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Morphological and Molecular Identification of Limnodrilus Claparede,1862 Species(clitellata: naiDIDAE) IN Tigris River, Baghdad/Iraq
...Show More Authors

Sludge worm samples were collected from the Tigers River sediment during the period from November 2018 to June 2019 in Al Sarafiya District/ Baghdad- Iraq. Biometric morphological measurements focusing on the form of penis sheath and chaetal morphology were used for species identification, in addition to molecular analysis by amplification of conserved 18s rRNA encoding gene using ITS1 and ITS4 universal primers.According to the morphological measurement records, the results revealed the existence of Limnodrilus hoffmeisteri Claparede 1862, L. claparedeianus Ratzel, 1868 and L. cervix Brinkhurst 1963. Other two groups of specimens, with short penis sheath, were identified by molecular technology as L

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Monitoring of the Vertical Settlement In Heavy Structures By Precise Levelling
...Show More Authors

Monitoring and analysing of the vertical deformations or the settlements of the structures is one of the main research fields in geodetic applications, which is considered a precise periodic measurement, made at different epochs to investigate these deformations on heavy structures.
In this research, the deformation measurements were carried out on one of Baghdad University buildings,” Building of Computers Department” of dimensions (70.0 * 81.3 m.). Due to some cracks observed in their walls, it was necessary to monitor the vertical displacement of this building at some particular monitoring points by constructing a vertical network and measured in different epochs. The first epoch (zero epoch) was carried out in April 2006, the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Nov 07 2016
Journal Name
Abu Dhabi International Petroleum Exhibition & Conference
Developed Material Balance Approach for Estimating Gas Initially in Place and Ultimate Recovery for Tight Gas Reservoirs
...Show More Authors
Abstract<p>The gas material balance equation (MBE) has been widely used as a practical as well as a simple tool to estimate gas initially in place (GIIP), and the ultimate recovery (UR) factor of a gas reservoir. The classical form of the gas material balance equation is developed by considering the reservoir as a simple tank model, in which the relationship between the pressure/gas compressibility factor (p/z) and cumulative gas production (Gp) is generally appeared to be linear. This linear plot is usually extrapolated to estimate GIIP at zero pressure, and UR factor for a given abandonment pressure. While this assumption is reasonable to some extent for conventional reservoirs, this may incur</p> ... Show More
View Publication
Scopus (11)
Crossref (5)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental and Numerical Research on Flow-Induced Vibration in Valves
...Show More Authors

Abstract  

All central air conditioning systems contain piping system with various components, sizes, material, and layouts. If such systems in operating mode, the flow in piping system and its component such as valves can produce severe vibration due to some flow phenomenon’s. In this research, experimental measurements and numerical simulation are used to study the flow-induced vibration in valves. Computational fluid dynamics (CFD) concepts are included with one-way and two-way fluid-structure interaction concepts by using finite element software Package (ANSYS 14.57). Detection analysis is performed on flow characteristics under operation conditions and relations with structural vibration. Most of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
An Artificial Intelligence Algorithm to Optimize the Classification of the Hepatitis Type
...Show More Authors

Hepatitis is one of the diseases that has become more developed in recent years in terms of the high number of infections. Hepatitis causes inflammation that destroys liver cells, and it occurs as a result of viruses, bacteria, blood transfusions, and others. There are five types of hepatitis viruses, which are (A, B, C, D, E) according to their severity. The disease varies by type. Accurate and early diagnosis is the best way to prevent disease, as it allows infected people to take preventive steps so that they do not transmit the difference to other people, and diagnosis using artificial intelligence gives an accurate and rapid diagnostic result. Where the analytical method of the data relied on the radial basis network to diagnose the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Spe/iatmi Asia Pacific Oil & Gas Conference And Exhibition
Influence of miscible CO2 flooding on wettability and asphaltene precipitation in Indiana Lime Stone
...Show More Authors

Carbon dioxide (CO2) flooding is an EOR technique in which carbon dioxide is injected into the reservoir to improve the oil recovery. The reservoir oil and rock properties are altered when carbon dioxide interacts with the oil and rock present in the reservoir. Carbon dioxide injection alters the oil and rock properties by causing reduction in oil viscosity, oil swelling and wettability alteration of the rock. This paper will present a proposal to study the wettability alteration in carbonate formations during miscible carbon dioxide flooding. In miscible carbon dioxide flooding, the injection pressure of carbon dioxide would be kept above the minimum miscibility pressure. Thus carbon dioxide is miscible with the oil present in the reservoi

... Show More
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Some Methods for Estimating the Survival Function and Failure Rate for the Exponentiated Expanded Power Function Distribution
...Show More Authors

 

     We have presented the distribution of the exponentiated expanded power function (EEPF) with four parameters, where this distribution was created by the exponentiated expanded method created by the scientist Gupta to expand the exponential distribution by adding a new shape parameter to the cumulative function of the distribution, resulting in a new distribution, and this method is characterized by obtaining a distribution that belongs for the exponential family. We also obtained a function of survival rate and failure rate for this distribution, where some mathematical properties were derived, then we used the method of maximum likelihood (ML) and method least squares developed  (LSD)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Hurst exponent estimation methods
...Show More Authors

Through recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth

... Show More
View Publication Preview PDF
Crossref (2)
Crossref