Preferred Language
Articles
/
bsj-2630
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego images. The proposed algorithm is compared with wavelet based algorithm which shows a favorable results in terms of PSNR reaches to 18 dB.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Securing Physical Layer for FHSS Communication System Using Code andPhase Hopping Techniques in CDMA, System Design and Implementation
...Show More Authors

The Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Nov 01 2014
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Derivationof Mathematical Equations to Calculate the Geographical Coordinates ofUnknown Position SituatedataDistance from the Observer Position Using GPS Data
...Show More Authors

Publication Date
Thu Nov 04 2021
Journal Name
Nat. Volatiles & Essent. Oils
Using The Aqueous Extract Of Allium Sativum In Improvement Of Some Physiological And Immunological Parameter In Albino Rats
...Show More Authors

The current study was designated to investigate the effect ofAllium sativumon some physiological and immunological parameters in rats. thirty adult rats were divided into three groups (10 rat for each). G1: served as healthy control, G2 :rats were treated with 150 mg\kg of Allium sativum, G3: treated with 300 mg\kg of Allium sativum. All treated animals were givenorally for 30 days. The aspartate , ) ALT ( alanine transaminase on some parameters were investigated such as garlic effects of total and differential counts of white blood , ) LDH ( lactate dehydrogenase ), AST ( transaminase cells(WBC) like Lymphocyte, Monocyte, Neutrophil, Basophil, Eosinophil,as

... Show More
Publication Date
Thu Jan 12 2023
Journal Name
Journal Of The Saudi Society Of Agricultural Sciences
Effect of planting density, foliar spraying and overlapping system on the growth and productivity using soilless culture system
...Show More Authors

Scopus (5)
Scopus
Publication Date
Mon Aug 31 2020
Journal Name
Bmc Oral Health
The success of using 2% lidocaine in pain removal during extraction of mandibular premolars: a prospective clinical study
...Show More Authors
Abstract<sec><title>Background

The purpose of this study was to evaluate the anesthetic effectiveness of a buccal infiltration technique combined with local massage (using 2% lidocaine) in the extraction of mandibular premolars to be utilized as an alternative to the conventional inferior alveolar nerve block.

Methods

Patients eligible included any subject with a clinical indication for tooth extraction of the mandibular 1st or 2nd premolars. All patients were anesthetized buccally by local infiltration technique followed by an external pressure applied for 1 min directly over the injection area. In each case, another local

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Mon Sep 20 2021
Journal Name
Journal Of Craniofacial Surgery
Presurgical Assessment of Anatomical Landmark Position Using Two Views of Cone Beam Computed Tomography: A Comparative Radiological Study
...Show More Authors

View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Sep 01 2008
Journal Name
Al-khwarizmi Engineering Journal
Design and Simulation of GaussianFSK Transmitter in UHF Band Using Direct Modulation of ΣΔ Modulator Fractional-N Synthesizer
...Show More Authors

This research involves design and simulation of GaussianFSK transmitter in UHF band using direct modulation of ΣΔ  fractional-N synthesizer with the following specifications:

Frequency range (869.9– 900.4) MHz, data rate 150kbps, channel spacing (500 kHz), Switching time 1 µs, & phase noise @10 kHz = -85dBc.

New circuit techniques have been sought to allow increased integration of radio transmitters and receivers, along with new radio architectures that take advantage of such techniques. Characteristics such as low power operation, small size, and low cost have become the dominant design criteria by which these systems are judged.

A direct modulation by ΣΔ  fractional-N synthesizer is proposed

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Blood donors appointment booking and managing system using PC and mobile web browsers in current pandemic (COVID-19)
...Show More Authors

<span>Blood donation is the main source of blood resources in the blood banks which is required in the hospitals for everyday operations and blood compensation for the patients. In special cases, the patients require fresh blood for compensation such as in the case of major operations and similar situations. Moreover, plasma transfusions are vital in the current pandemic of coronavirus disease (COVID-19). In this paper, we have proposed a donation system that manages the appointments between the donors and the patient in the case of fresh blood donation is required. The website is designed using the Bootstrap technology to provide suitable access using the PC or the smart phones web browser. The website contains large database

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jul 30 2022
Journal Name
Global Academic Journal Of Linguistics And Literature
A Critical Stylistic Analysis of Transcultural Identity in Lyer’s The Global Soul (2001) Using the Tool of Negation
...Show More Authors

This study is intended to examine the concept of transcultural identity in the travel book The Global Soul: Jet Lag, Shopping Malls, and the Search for Home by (Iyer, 2001). Jeffries’ model of critical stylistics (2010) (henceforth, CS) has been selected to analyze the book. To be more specific, Negation is selected to analyze the concept under study. As such, the study aims at finding out how Negation is used to portray ideological meanings representing the concept of transcultural identity in one non-fictional travel book; and finding out the ideologies related to the concept analyzed. The analysis of the data shows that Negation is a suitable analytical tool to reach the ideational meaning of the text towards the concept of tra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF