Preferred Language
Articles
/
_Rbr9YsBVTCNdQwCr-ZQ
A proposed encryption technique of different texts using circular link lists
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Aug 01 2021
Journal Name
Telkomnika
Proposed different relay selection schemes for improving the performance of cooperative wireless networks
...Show More Authors

Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Publication Date
Thu Dec 01 2022
Journal Name
Iop Conference Series: Earth And Environmental Science
Velocity Patterns inside the Proposed Makhool Dam Reservoir with Different Operation Plans
...Show More Authors
Abstract<p>The Makhoul Dam project proposed to be established is considered one of the strategic projects in Iraq as it works to insurance large quantity of water spare in flood seasons, increase the storage capacity of the dams in Iraq, as well as increase food security. The Makhool Dam is located on Tigris River in Salah al-Din Governorate, and 8 km south of the meeting point of the Tigris River with the Lower Zab River. The lake area is about 256 km2. In this research, a mathematical model was prepared by using HEC-RAS Two Dimension Software to analyze the velocity patterns and water depths inside makhool dam reservoir at the highest operational water elevation, based on the designs prepared </p> ... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology &amp; Applied Science Research
A Numerical Study of Concrete Composite Circular Columns encased with GFRP I-Section using the Finite Element Method
...Show More Authors

This paper presents ABAQUS simulations of fully encased composite columns, aiming to examine the behavior of a composite column system under different load conditions, namely concentric, eccentric with 25 mm eccentricity, and flexural loading. The numerical results are validated with the experimental results obtained for columns subjected to static loads. A new loading condition with a 50 mm eccentricity is simulated to obtain additional data points for constructing the interaction diagram of load-moment curves, in an attempt to investigate the load-moment behavior for a reference column with a steel I-section and a column with a GFRP I-section. The result comparison shows that the experimental data align closely with the simulation

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci
Swelling Behavior of Cross-link PVA with Glutaraldehyde
...Show More Authors

The polymeric hydrogels composed of poly vinyl alcohol (m.wt 72000) and glutaraldehyde(5%,8% and 10%) , have been thermally prepared for the purpose of studying their swelling and drug release behavior . The swelling ratio was measured for all the hydrogel samples at 37°C, in three different media pH (1.2, 4.7 and 6.8) as a function of time. The results show that the maximum swelling ratios were arranged as follows :pH =6.8 > pH =4.7 > pH =1.2 hydrogels cross linked PVA showed a typical pH responsive behavior such as high pH has maximum swelling while low pH shows minimum swelling.

Publication Date
Tue Jan 01 2019
Journal Name
Plant Archives
Assessment of organic carbon content in different topographic from northern Iraq using remote sensing technique and GIS
...Show More Authors

Scopus (1)
Scopus
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Fractal Image Compression Using Block Indexing Technique: A Review
...Show More Authors

Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
J. Baghdad For Sci
Numerical Simulations of Imaging Extrasolar Planets using Circular and Square Apodize Apertures
...Show More Authors

Numerical simulations are carried out to assess the quality of the circular and square apodize apertures in observing extrasolar planets. The logarithmic scale of the normalized point spread function of these apertures showed sharp decline in the radial frequency components reaching to 10-36 and 10-34 respectively and demonstrating promising results. This decline is associated with an increase in the full width of the point spread function. A trade off must be done between this full width and the radial frequency components to overcome the problem of imaging extrasolar planets.