Preferred Language
Articles
/
EBczEZIBVTCNdQwC2p7B
An efficient selective method for audio watermarking against de-synchronization attacks
...Show More Authors

Scopus
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Computers, Materials & Continua
An Optimal Method for Supply Chain Logistics Management Based on Neural Network
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2015
Journal Name
The Sai 2015
An optimal defuzzification method for interval type-2 fuzzy logic control scheme
...Show More Authors

Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Audio Lesson at the Glass (311 H)
...Show More Authors

The acoustic efforts of the glass were found in the meanings mixed with other linguistic, grammatical and morphological issues, as the glass was not allocated to the detective or separate chapters in the meanings. The glass-walled in the audio lesson according to the doctrine of the optical, has stated so in several places of its meaning. Glass is interested in mentioning the strong qualities that have a great impact in the chorus and replacements such as loudness, dishes, arrogance, whistling, repetition, and richness. Glass was concerned with the phenomenon of diphtheria great care, and explained its purpose of seeking lightness and ease of pronunciation, and Siboe agreed in its origins and issues, and the glass used three criteria in

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
BUILD AN EFFICIENT INVESTMENT PORTFOLIO USING THE WILLIAM RATIO (EMPIRICAL STUDY) IN IRAQ STOCK EXCHANGE: BUILD AN EFFICIENT INVESTMENT PORTFOLIO USING THE WILLIAM RATIO (EMPIRICAL STUDY) IN IRAQ STOCK EXCHANGE
...Show More Authors

ABSTRACT

            This study aimed to choose top stocks through technical analysis tools specially the indicator called (ratio of William index), and test the ability of technical analysis tools in building a portfolio of shares efficient in comparison with the market portfolio. These one technical tools were used for building one portfolios in 21 companies on specific preview conditions and choose 10 companies for the period from (March 2015) to (June 2017). Applied results of the research showed that Portfolio yield for companies selected according to the ratio of William index indicator (0.0406) that

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2009
Journal Name
J. Appl. Sci
Watermarking based Fresnel transform, wavelet transform, and chaotic sequence
...Show More Authors

Scopus (2)
Scopus
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Image Watermarking based on Huffman Coding and Laplace Sharpening
...Show More Authors

In this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 14 2017
Journal Name
International Journal Of Intelligent Computing And Cybernetics
Two efficient methods for solving Schlömilch’s integral equation
...Show More Authors
Purpose

In this paper, the exact solutions of the Schlömilch’s integral equation and its linear and non-linear generalized formulas with application are solved by using two efficient iterative methods. The Schlömilch’s integral equations have many applications in atmospheric, terrestrial physics and ionospheric problems. They describe the density profile of electrons from the ionospheric for awry occurrence of the quasi-transverse approximations. The paper aims to discuss these issues.

Design/methodology/approach

First, the authors apply a regularization meth

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Dec 01 2010
Journal Name
Iraqi Journal Of Physics
An Improved Method for the Determination of Airplane Radial Velocity Using Doppler Shift
...Show More Authors

In this research velocity of moving airplane from its recorded digital sound is introduced. The data of sound file is sliced into several frames using overlapping partitions. Then the array of each frame is transformed from time domain to frequency domain using Fourier Transform (FT). To determine the characteristic frequency of the sound, a moving window mechanics is used, the size of that window is made linearly proportional with the value of the tracked frequency. This proportionality is due to the existing linear relationship between the frequency and its Doppler shift. An algorithm was introduced to select the characteristic frequencies, this algorithm allocates the frequencies which satisfy the Doppler relation, beside that the tra

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 21 2020
Journal Name
2020 Emerging Technology In Computing, Communication And Electronics (etcce)
An Integrated Grey Wolf Optimizer with Nelder-Mead Method for Workflow Scheduling Problem
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref