Preferred Language
Articles
/
fxbjB4cBVTCNdQwCwDC3
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods in terms of average segmental SNR, number of failing samples, and Czekanowski Distance (CZD). In addition, the proposed method shows the ability to operate with large message sizes (up to half of carrier size) with graceful degradation as opposed to the other methods which fail at large message size. So, the proposed method provides more flexibility in message and carrier sizes while preserving high efficiency.

Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Thu Feb 09 2023
Journal Name
Artificial Intelligence Review
Community detection model for dynamic networks based on hidden Markov model and evolutionary algorithm
...Show More Authors

Finding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over

... Show More
View Publication
Scopus (14)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Image encryption based on combined between linear feedback shift registers and 3D chaotic maps
...Show More Authors

Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Thu Nov 17 2016
Journal Name
Plos One
Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network
...Show More Authors

Vehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destina

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
An Optimised Method for Fetching and Transforming Survey Data based on SQL and R Programming Language
...Show More Authors

The development of information systems in recent years has contributed to various methods of gathering information to evaluate IS performance. The most common approach used to collect information is called the survey system. This method, however, suffers one major drawback. The decision makers consume considerable time to transform data from survey sheets to analytical programs. As such, this paper proposes a method called ‘survey algorithm based on R programming language’ or SABR, for data transformation from the survey sheets inside R environments by treating the arrangement of data as a relational format. R and Relational data format provide excellent opportunity to manage and analyse the accumulated data. Moreover, a survey syste

... Show More
View Publication Preview PDF
Crossref (1)
Clarivate Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Preparing a New Type of Concrete Based on Sulfur-melamine Modifier
...Show More Authors

In this research work, a new type of concrete based on sulfur-melamine modification was introduced, and its various properties were studied. This new type of concrete was prepared based on the sulfur-melamine modification and various ingredients. The new sulfur-melamine modifier was fabricated, and its fabrication was confirmed by IR spectroscopy and TG analysis. The surface morphology resulted from this modifier was studied by SEM and EDS analysis. The components ratios in concrete, chemical and physical characteristics resulted from sulfur-melamine modifier, chemical and corrosion resistance of concrete, stability of concrete against water adsorption, stability of concrete against freezing, physical and mechanical properties and durabi

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Comparison of Different DEM Generation Methods based on Open Source Datasets
...Show More Authors

Digital Elevation Model (DEM) is one of the developed techniques for relief representation.  The definition of a DEM construction is the modeling technique of earth surface from existing data. DEM plays a role as one of the fundamental information requirement that has been generally utilized in GIS data structures. The main aim of this research is to present a methodology for assessing DEMs generation methods. The DEMs data will be extracted from open source data e.g. Google Earth. The tested data will be compared with data produced from formal institutions such as General Directorate of Surveying. The study area has been chosen in south of Iraq (Al-Gharraf / Dhi Qar governorate. The methods of DEMs creation are kri

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Comparison of Different DEM Generation Methods based on Open Source Datasets
...Show More Authors

Digital Elevation Model (DEM) is one of the developed techniques for relief representation.  The definition of a DEM construction is the modeling technique of earth surface from existing data. DEM plays a role as one of the fundamental information requirement that has been generally utilized in GIS data structures. The main aim of this research is to present a methodology for assessing DEMs generation methods. The DEMs data will be extracted from open source data e.g. Google Earth. The tested data will be compared with data produced from formal institutions such as General Directorate of Surveying. The study area has been chosen in south of Iraq (Al-Gharraf / Dhi Qar governorate. The methods of DEMs creation are kriging, IDW (inver

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Humanities And Social Sciences/ Rimak
AN EMPIRICAL ANALYSIS OF EDUCATIONAL RESEARCH BASED ON CRITICAL DISCOURSE ANALYSIS
...Show More Authors

APDBN Rashid, International Journal of Humanities and Social Sciences/ RIMAK, 2023

View Publication
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Problem Based Learning on EFL Learners’ Achievement
...Show More Authors

The present study discusses the problem based learning in Iraqi classroom. This method aims to involve all learners in collaborative activities and it is learner-centered method. To fulfill the aims and verify the hypothesis which reads as follow” It is hypothesized that there is no statistically significant differences between the achievements of Experimental group and control group”. Thirty learners are selected to be the sample of present study.Mann-Whitney Test for two independent samples is used to analysis the results. The analysis shows that experimental group’s members who are taught according to problem based learning gets higher scores than the control group’s members who are taught according to traditional method. This

... Show More
View Publication Preview PDF