Preferred Language
Articles
/
yhY5mYcBVTCNdQwCGFen
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the produced key is used to determine the starting pixel in each block for hiding and the direction of hiding (clockwise or anticlockwise). The proposed method is applied on many images with different embedding rate, and many metrics are used to evaluate the performance of the proposed method such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), correlation factor (CF) and Structural Similarity Index Measure (SSIM). It achieves in average 52.225 dB of PSNR, 0.3215 of MSE, 0.9952 of SSIM and 0.9997 of CF with embedding rate 1.5.

Scopus Crossref
Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 24 2017
Journal Name
Spe Kingdom Of Saudi Arabia Annual Technical Symposium And Exhibition
Optimization of Infill Drilling in Whicher Range Field in Australia
...Show More Authors
Abstract<p>Now that most of the conventional reservoirs are being depleted at a rapid pace, the focus is on unconventional reservoirs like tight gas reservoirs. Due to the heterogeneous nature and low permeability of unconventional reservoirs, they require a huge number of wells to hit all the isolated hydrocarbon zones. Infill drilling is one of the most common and effective methods of increasing the recovery, by reducing the well spacing and increasing the sweep efficiency. However, the problem with drilling such a large number of wells is the determination of the optimum location for each well that ensures minimum interference between wells, and accelerates the recovery from the field. Detail</p> ... Show More
View Publication
Scopus (15)
Crossref (8)
Scopus Crossref
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Comparison Among Three Estimation Methods to Estimate Cascade Reliability Model (2+1) Based On Inverted Exponential Distribution
...Show More Authors

      In this paper, we are mainly concerned with estimating cascade reliability model (2+1) based on inverted exponential distribution and comparing among the estimation methods that are used . The maximum likelihood estimator and uniformly minimum variance unbiased estimators are used to get  of the strengths  and the stress ;k=1,2,3 respectively then, by using the unbiased estimators, we propose Preliminary test single stage shrinkage (PTSSS) estimator when a prior knowledge is available for the scale parameter as initial value due past experiences . The Mean Squared Error [MSE] for the proposed estimator is derived to compare among the methods. Numerical results about conduct of the considered

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Continuous Classical Optimal Control Problems for Triple Nonlinear Elliptic Boundary Value Problem
...Show More Authors

     In this research, our aim is to study the optimal control problem (OCP) for triple nonlinear elliptic boundary value problem (TNLEBVP). The Mint-Browder theorem is used to prove the existence and uniqueness theorem of the solution of the state vector for fixed control vector. The existence theorem for the triple continuous classical optimal control vector (TCCOCV) related to the TNLEBVP is also proved. After studying the existence of a unique solution for the triple adjoint equations (TAEqs) related to the triple of the state equations, we derive The Fréchet derivative (FD) of the cost function using Hamiltonian function. Then the theorems of necessity conditions and the sufficient condition for optimality of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
An excerpt on the analysis of correlate constructions: Exkurs zur Analyse der Korrelatkonstruktionen
...Show More Authors

The main idea that led me to write such research paper within the framework of Germanic linguistics is that I have not found any topic dealing with the term correlate in the German language, except in several articles in linguistic journals as well as one topic in a book describing the use of such a linguistic phenomenon in the language system. The research initially deals with the definition of the correlate at the level of the German language system. Correlate is unity describes specific relation of two sentences and identifies denoted constructs. Correlate is called a placeholder at the syntactic level because it does not occupy its original topological fields in the syntactic structure. The correlate (es) or the prepositiona

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On A Bitopological (1,2)*- Proper Functions
...Show More Authors

   In this paper, we introduce a new type of functions in bitopological spaces, namely, (1,2)*-proper functions. Also, we study the basic properties and characterizations of these functions . One of the most important of equivalent definitions to the (1,2)*-proper functions is given by using (1,2)*-cluster points of filters . Moreover we define and study (1,2)*-perfect functions and (1,2)*-compact functions in bitopological spaces and we study the relation between (1,2)*-proper functions and each of (1,2)*-closed functions , (1,2)*-perfect functions and (1,2)*-compact functions and we give an example when the converse may not be true .
 

View Publication Preview PDF
Publication Date
Wed Oct 06 2021
Journal Name
College Of Islamic Sciences
Linguistic deposits in the Arabic language
...Show More Authors

 

Abstract of the research:

     This research sheds light on an important phenomenon in our Arabic language, which is linguistic sediments, and by which we mean a group of vocabulary that falls out of use and that native speakers no longer use it, and at the same time it happens that few individuals preserve the phenomenon and use it in their lives, and it is one of the most important phenomena that  It should be undertaken and studied by researchers;  Because it is at the heart of our huge linguistic heritage, as colloquial Arabic dialects retain a lot of linguistic sediments, and we usually find them at all levels of language: phonetic, banking, grammatical and semantic.  In the

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
Fibrewise slightly topological spaces
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Al-nahrain Journal Of Science (anjs)
Fibrewise Pairwise Bi-Topological Spaces
...Show More Authors

The main idea of this research is to consider fibrewise pairwise versions of the more important separation axioms of ordinary bitopology named fibrewise pairwise - spaces, fibrewise pairwise - spaces, fibrewise pairwise - spaces, fibrewise pairwise -Hausdorff spaces, fibrewise pairwise functionally -Hausdorff spaces, fibrewise pairwise -regular spaces, fibrewise pairwise completely -regular spaces, fibrewise pairwise -normal spaces and fibrewise pairwise functionally -normal spaces. In addition we offer some results concerning it.

Preview PDF
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
Pragmatics and Speech Act- History, Importance and Stages of Development: הפרגמטיקה ופעולת־הדיבור- התולדות, החשיבות ושלבי ההתפתחות (יישמוים בלשון העברית)
...Show More Authors

      The present study stresses two of the most significant aspects of linguistic approach: Pragmatics” and the “Speech Act Theory”, revealing its importance and the stages and levels of development through Hebrew language’s speech acts analysis including (political speech, the Holy Bible, Hebrew stories).

       Chronologically, Pragmatics has always been the center of linguists’ interests due to its importance in linguistic decryptions, particularly, through “Speech Act Theory” that has been initiated and developed by the most prominent philosophers and linguistics.

        The prese

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Leadership ethics and transformational leadership to develop perceptions of organizational work supportA survey of a sample of the staff of the Ministry of Water Resources
...Show More Authors

The aim of organizational contemporary is development man power active, in spit-of there are littlie resources. But in the Iraqi environment there are too much resources with performance inhabiting. specially in the ministry of water resources (sample of this research), about dryness and lower levels of rivers. There for this study have some important variable, it is ethical leadership & transformational leadership as (independent variable), and Perceived organizational support(dependent variable). Over here to invest with authority on the problem of research, is weakness harmony between employed perception and the pattern of leadership. We find decline in of reaction of organ compound between the variable to weaken high perf

... Show More
View Publication Preview PDF
Crossref