Preferred Language
Articles
/
ixbtvYoBVTCNdQwCrKR6
Cryptography Techniques - A Review
...Show More Authors

l

Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 19 2017
Journal Name
Al-khwarizmi Engineering Journal
Prediction of Reaction Kinetic of Al- Doura Heavy Naphtha Reforming Process Using Genetic Algorithm
...Show More Authors

In this study, genetic algorithm was used to predict the reaction kinetics of Iraqi heavy naphtha catalytic reforming process located in Al-Doura refinery in Baghdad.  One-dimensional steady state model was derived to describe commercial catalytic reforming unit consisting of four catalytic reforming reactors in series process.

The experimental information (Reformate composition and output temperature) for each four reactors collected at different operating conditions was used to predict the parameters of the proposed kinetic model. The kinetic model involving 24 components, 1 to 11 carbon atoms for paraffins and 6 to 11 carbon atom for naphthenes and aromatics with 71 reactions. The pre-exponential Arrhenius constants and a

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 10 2016
Journal Name
ألمؤتمر الدولي العلمي الخامس للاحصائيين العرب/ القاهرة
Proposition of Modified Genetic Algorithm to Estimate Additive Model by using Simulation
...Show More Authors

Often phenomena suffer from disturbances in their data as well as the difficulty of formulation, especially with a lack of clarity in the response, or the large number of essential differences plaguing the experimental units that have been taking this data from them. Thus emerged the need to include an estimation method implicit rating of these experimental units using the method of discrimination or create blocks for each item of these experimental units in the hope of controlling their responses and make it more homogeneous. Because of the development in the field of computers and taking the principle of the integration of sciences it has been found that modern algorithms used in the field of Computer Science genetic algorithm or ant colo

... Show More
Preview PDF
Publication Date
Tue Apr 02 2024
Journal Name
Al-iraqia Journal Of Scientific Engineering Research
Prioritise Five Tafseer Translators Using Clustering Technique for Surah Al-Baqarah
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 30 2008
Journal Name
Iraqi Journal Of Science
On the Greedy Ridge Function Neural Networks for Approximation Multidimensional Functions
...Show More Authors

The aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).

Preview PDF
Publication Date
Mon Dec 21 2020
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
MONITORING OF THE WILD MAMMAL FAUNA IN BAMO MOUNTAIN IN NORTHERN IRAQ (KURDISTAN) FOR THE FIRST TIME USING CAMERA TRAP METHOD AND RAISING AWARENESS FOR ITS CONSERVATION
...Show More Authors

Mammals are under threat worldwide due to deforestation, hunting, and other human activities. In Iraq, a total of 93 species of wild mammals have been recorded including species with global conservation concern. Bamo Mountain is situated within the Zagros Mountains in northern Iraq which is a suitable habitat for wild mammals. Due to scarcity of the field survey efforts and cryptic behavior, monitoring of the wild mammals fauna in Zagros Mountain seems challenging. Therefore, we used a camera trap which seems to be an ideal way to determine species diversity of wild mammals in Bamo Mountain. Moreover, interviews with local villagers were performed. The mammalian diversity of Bamo Mountain is not fully explored but seemed threatened by lo

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
FLOW INJECTION ANALYSIS AND SPECTROPHOTOMETRIC DETERMINATION OF NIFEDIPINEIN PHARMACEUTICAL FORMULATION: FLOW INJECTION ANALYSIS AND SPECTROPHOTOMETRIC DETERMINATION OF NIFEDIPINEIN PHARMACEUTICAL FORMULATION
...Show More Authors

A new simple and sensitive spectrophotometric method is described for quantification of Nifedipine (NIF) and their pharmaceutical formulation. The selective method was performed by the reduction of NIF nitro group to yield primary amino group using zinc powder with hydrochloric acid. The produced aromatic amine was submitted to oxidative coupling reaction with pyrocatechol and ammonium ceric nitrate to form orange color product measured spectrophotometrically with maximum absorption at 467nm. The product was determined through flow injection analysis (FIA) system and all the chemical and physical parameters were optimized. The concentration range from 5.0 to 140.0 μg.mL-1 was obeyed Beer’s law with a limit of detection and quantitatio

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Modeling and Simulation for Performance Evaluation of Optical Quantum Channels in Quantum key Distribution Systems
...Show More Authors

In this research work, a simulator with time-domain visualizers and configurable parameters using a continuous time simulation approach with Matlab R2019a is presented for modeling and investigating the performance of optical fiber and free-space quantum channels as a part of a generic quantum key distribution system simulator. The modeled optical fiber quantum channel is characterized with a maximum allowable distance of 150 km with 0.2 dB/km at =1550nm. While, at =900nm and =830nm the attenuation values are 2 dB/km and 3 dB/km respectively. The modeled free space quantum channel is characterized at 0.1 dB/km at =860 nm with maximum allowable distance of 150 km also. The simulator was investigated in terms of the execution of the BB84 prot

... Show More
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Identificatio n Of Key Factors Affecting Waste Management In Life Cycle Of The Construction Project By Using Delphi Technique
...Show More Authors

The problem of generated waste as a result of the implementation of construction projects, has  been aggravated recently because of construction activity experienced by the world, especially Iraq, which is going through a period of reconstruction, where construction waste represents (20-40%) of the total generated waste and has a negative effect on the environment and economic side of the project. In addition, the rate of consumpted  amounts of natural resources are estimated to be about 40% in the construction industry, so it became necessary to reduce waste and to be manage well. This study aims to identify the key factors affecting waste management through the various phases of the project, and this is accom

... Show More
View Publication Preview PDF