Preferred Language
Articles
/
bsj-8715
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to a subsystem consisting of an Reversible Logic Gate (RLG) group to obtain the secret keys that are passed to Rivest Shamir Adleman (RSA) to finish encrypting the image. The results indicate that the proposed method has the ability to generate a very large set of highly complex and secure secret keys that can be used later in the encryption stage. Moreover, the number and complexity of those keys will change each time the image is changed, and this represents the contribution of the proposed method. They experienced no time loss throughout the encryption and decryption processes when using RLG, which indicates that the proposed system did a good job in making different keys from the same image. And it differs in the strength of the key from one image to another, depending on the nature of the color imge.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 09 2021
Journal Name
Applied System Innovation
Design and Optimization of Vertical Axis Wind Turbines Using QBlade
...Show More Authors

Wind energy is considered one of the most important sources of renewable energy in the world, because it contributes to reducing the negative effects on the environment. The most important types of wind turbines are horizontal and vertical axis wind turbines. This work presents the full details of design for vertical axis wind turbine (VAWT) and how to find the optimal values of necessary factors. Additionally, the results shed light on the efficiency and performance of the VAWT under different working conditions. It was taken into consideration the variety of surrounding environmental conditions (such as density and viscosity of fluid, number of elements of the blade, etc.) to simulate the working of vertical wind turbines under di

... Show More
Scopus (23)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Mon May 06 2019
Journal Name
Journal Of Physical Education
Designing Teaching Aids and Their Effects on Learning and Retaining Diving and Cartwheel on Floor Exercises in Women’s’ Artistic Gymnastics
...Show More Authors

Designing Teaching Aids and Their Effects on Learning and Retaining Diving and Cartwheel on Floor Exercises in Women’s’ Artistic Gymnastics

The research aimed at designing teaching aids that develop and help retain diving and cartwheel for third year college of physical education and sport sciences students in women’s artistic gymnastics. In addition to that, the researchers aimed at identifying the effect of these aids on learning and retaining cartwheel and diving in floor exercises. The researchers used the experimental method. The subjects were (20) third year female students from the college of physical education and sport sciences/ university of Baghdad sections K and H. the main experiment lasted for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 01 2023
Journal Name
Environmental Nanotechnology, Monitoring & Management
Photodegradation of tetracycline antibiotic by ternary recyclable Z-scheme g-C3N4/Fe3O4/Bi2WO6/Bi2S3 photocatalyst with improved charge separation efficiency: Characterization and mechanism studies
...Show More Authors

View Publication
Scopus (34)
Crossref (9)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Medical Image Compression using Wavelet Quadrants of Polynomial Prediction Coding & Bit Plane Slicing
...Show More Authors

Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
COMPARATIVE STUDY FOR EDGE DETECTION OF NOISY IMAGE USING SOBEL AND LAPLACE OPERATORS
...Show More Authors

Many approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 11 2018
Journal Name
Iraqi Journal Of Physics
Estimation of kidney tumor volume in CT images using medical image segmentation techniques
...Show More Authors

Kidney tumors are of different types having different characteristics and also remain challenging in the field of biomedicine. It becomes very important to detect the tumor and classify it at the early stage so that appropriate treatment can be planned. Accurate estimation of kidney tumor volume is essential for clinical diagnoses and therapeutic decisions related to renal diseases. The main objective of this research is to use the Computer-Aided Diagnosis (CAD) algorithms to help the early detection of kidney tumors that addresses the challenges of accurate kidney tumor volume estimation caused by extensive variations in kidney shape, size and orientation across subjects.
In this paper, have tried to implement an automated segmentati

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Image classification with Deep Convolutional Neural Network Using Tensorflow and Transfer of Learning
...Show More Authors

The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Numerical scheme to Solve Boundary Value Problems Involving Singular Perturbation
...Show More Authors

The Wang-Ball polynomials operational matrices of the derivatives are used in this study to solve singular perturbed second-order differential equations (SPSODEs) with boundary conditions. Using the matrix of Wang-Ball polynomials, the main singular perturbation problem is converted into linear algebraic equation systems. The coefficients of the required approximate solution are obtained from the solution of this system. The residual correction approach was also used to improve an error, and the results were compared to other reported numerical methods. Several examples are used to illustrate both the reliability and usefulness of the Wang-Ball operational matrices. The Wang Ball approach has the ability to improve the outcomes by minimi

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 12 2016
Journal Name
Wireless Networks
Low communication cost (LCC) scheme for localizing mobile wireless sensor networks
...Show More Authors

In recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication

... Show More
View Publication
Scopus (34)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Mon Jan 13 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The evaluation of the role of the information system in reducing tax evasion
...Show More Authors

This research attempts to evaluate the role of the information system by highlighting its importance in providing date and information to the tax administration the process of tax accounting for those who are subject to income tax whether they are individuals or companies where the effective information system provides accurate and reliable information in a timely manner.

At the theoretical part of the research, the research approaches the problem of the research represented in that whether the information system, applied in the General Commission for Taxes, is capable of achieving its role in reducing the phenomenon of tax evasion. The existence of a set of things which in the Commission may lead to increase tax evasion by taxpa

... Show More
View Publication Preview PDF