Preferred Language
Articles
/
bsj-2630
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego images. The proposed algorithm is compared with wavelet based algorithm which shows a favorable results in terms of PSNR reaches to 18 dB.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Flexural Behavior of Reinforced Concrete Beams Reinforced with 3D-Textile Composite Fiber
...Show More Authors

Normal concrete is weak against tensile strength, has low ductility, and also insignificant resistance to cracking. The addition of diverse types of fibers at specific proportions can enhance the mechanical properties as well as the durability of concrete. Discrete fiber commonly used, has many disadvantages such as balling the fiber, randomly distribution, and limitation of the Vf ratio used. Based on this vision, a new technic was discovered enhancing concrete by textile-fiber to avoid all the problems mentioned above. The main idea of this paper is the investigation of the mechanical properties of SCC, and SCM that cast with 3D AR-glass fabric having two different thicknesses (6, 10 mm), and different layers (1,2 laye

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
SlantletTransformbased VideoDenoising
...Show More Authors

A technique for noise removal is proposed based on slantlet transform. The proposed algorithm tends to reduce the computational time by reducing the total number of frames through dividing the video film into sub films, finding master frames, applying the slantlet transform which is orthogonal discrete wavelet transform with two zero moments and with improved time localization. Thresholding technique is applied to the details coefficients of the slantlet transform .The denoised frame is repeated to retain the original frame sequence. The proposed method was applied by using MATLAB R2010a with video contaminated by white Gaussian noise .The experimental results show that the proposed method provides better subjective and object

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
A Software Defined Network of Video Surveillance System Based on Enhanced Routing Algorithms
...Show More Authors

Software Defined Network (SDN) is a new technology that separate the ‎control plane from the data plane. SDN provides a choice in automation and ‎programmability faster than traditional network. It supports the ‎Quality of Service (QoS) for video surveillance application. One of most ‎significant issues in video surveillance is how to find the best path for routing the packets ‎between the source (IP cameras) and destination (monitoring center). The ‎video surveillance system requires fast transmission and reliable delivery ‎and high QoS. To improve the QoS and to achieve the optimal path, the ‎SDN architecture is used in this paper. In addition, different routing algorithms are ‎used with different steps. First, we eva

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
An edge detection algorithm matching visual contour perception
...Show More Authors

For several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.

View Publication Preview PDF
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
Enforcing Wiener Filter in the Iterative Blind Restoration Algorithm
...Show More Authors

A new blind restoration algorithm is presented and shows high quality restoration. This
is done by enforcing Wiener filtering approach in the Fourier domains of the image and the
psf environments

View Publication Preview PDF
Publication Date
Thu Nov 27 2025
Journal Name
Frontiers In Robotics And Ai
Design of modified fractional-order PID controller for lower limb rehabilitation exoskeleton robot based on an improved elk herd hybridized with grey wolf and multi-verse optimization algorithms
...Show More Authors

Rehabilitation robots are widely recognized as vital for restoring motor function in patients with lower-limb impairments. A Modified Fractional-Order Proportional-Integral-Derivative (MFOPID) controller is proposed to improve trajectory tracking of a 2-DoF Lower Limb Rehabilitation Exoskeleton Robot (LLRER). The classical FOPID is augmented with a modified control formulation by which steady-state error is reduced and the transient response is sharpened. Controller gains and fractional orders were tuned offline using a hybrid metaheuristic Improved Elk Herd Optimization hybridized with Grey Wolf and Multi-Verse Optimization algorithms (IElk-GM) so that exploration and exploitation are balanced. Superiority over the classical FOPID

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
The aesthetic images in Mohammed Thanoun graphic
...Show More Authors

The tagged search (The aesthetic images in Mohammed Thanoun graphic) four chapters, Chapter I was concerned the statement of the research problem, the research importance and it’s needed, the goal of research in identifying the aesthetic images in the graphic of the artist's, the research limits, and identifying the most important terms, chapter II came with theoretical framework and included three chapters: chapter I was interested in the aesthetic concept. chapter II is the image aesthetic in the graphic, and chapter III is the artist experience, Chapter III specializes in research procedures: community, sample, curriculum, tool, and sample analysis. Chapter IV ended with results, including: dynamic research sample illustrated of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 17 2022
Journal Name
Al–bahith Al–a'alami
Women’s Traits In The Iraqi Satirical Television Show ‘State Of Melon’ A Paper Extracted from A Masters Thesis
...Show More Authors

The research aims to know the traits or characteristics of woman in terms of her external
appearance, motives for her behavior, feelings, mood and ability.
It, moreover, seeks woman’s relationship with others as it is presented by the Iraqi
satirical television show “ State of Melon “.
The researcher adopted for that survey approach using the method of content analysis
to study the research sample represented by “ State of Melon “ show which was
exposed through the screen of a group of channels:
“Hona Baghdad Satellite Channel, then Asia Satellite Channel, Dijla Satellite Channel,
and UTV Satellite Channel.”For this, the researcher used Margaret Gallagher’s Model to analyze the image of
woman in

... Show More
View Publication Preview PDF
Crossref (1)
Crossref