Preferred Language
Articles
/
jcoeduw-163
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Hybrid CNN-based Recommendation System
...Show More Authors

Recommendation systems are now being used to address the problem of excess information in several sectors such as entertainment, social networking, and e-commerce. Although conventional methods to recommendation systems have achieved significant success in providing item suggestions, they still face many challenges, including the cold start problem and data sparsity. Numerous recommendation models have been created in order to address these difficulties. Nevertheless, including user or item-specific information has the potential to enhance the performance of recommendations. The ConvFM model is a novel convolutional neural network architecture that combines the capabilities of deep learning for feature extraction with the effectiveness o

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Projective MDS Codes Over GF(27)‎
...Show More Authors

MDS code is a linear code that achieves equality in the Singleton bound, and projective MDS (PG-MDS) is MDS code with independents property of any two columns of its generator matrix.   In this paper, elementary methods for modifying a PG-MDS code of dimensions 2, 3, as extending and lengthening, in order to find new incomplete PG-MDS codes have been used over . Also, two complete PG-MDS codes over  of length  and 28 have been found.

View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Risk management in industrial economic units by using Pareto Chart
...Show More Authors

In the light of the globalization Which surrounds the business environment and whose impact has been reflected on industrial economic units  the whole world has become a single market that affects its variables on all units and is affected by the economic contribution of each economic unit as much as its share. The problem of this research is that the use of Pareto analysis enables industrial economic units to diagnose the risks surrounding them , so the main objective of the research was to classify risks into both internal and external types and identify any risks that require more attention.

The research was based on the hypothesis that Pareto analysis used, risks can be identified and addressed before they occur.

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu May 05 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Classification SINGLE-LEAD ECG by using conventional neural network algorithm
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Solving Hyperbolic Trajectory Using New Predictor-Corrector Quadrature Algorithms
...Show More Authors

In this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 04 2018
Journal Name
Baghdad Science Journal
Designing and Constructing the Strain Sensor Using Microbend Multimode Fiber
...Show More Authors

The microbend sensor is designed to experience a light loss when force is applied to the sensor. The periodic microbends cause propagating light to couple into higher order modes, the existing higher order modes become unguided modes. Three models of deform cells are fabricated at (3, 5, 8) mm pitchand tested by using MMF and laser source at 850 nm. The maximum output power of (8, 5, 3)mm model is (3, 2.7, 2.55)nW respectively at applied force 5N and the minimum value is (1.9, 1.65, 1.5)nW respectively at 60N.The strain is calculated at different microbend cells ,and the best sensitivity of this sensor for cell 8mm is equal to 0.6nW/N.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Applied Sciences
Improvement of Mechanical Welding Properties by using Induced Harmonic Vibration
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
The effect of using Nano iron oxide in radiological shielding
...Show More Authors
Abstract<p>In this study, some attenuation parameters of gamma shields were studied. This shields consisting of composite materials of Unsaturated polyester as a base material and Nano iron oxide (Fe<sub>2</sub>O<sub>3</sub>) and, micro iron (Fe) as reinforcement materials at different percentages (1, 3,5,7and 9)wt%, and with different thickness (1, 1.5, 2, 2.5, 3, 3.5and 4) cm. The results showed that the use of nanoparticles is better than the microparticales in the field of radiation shielding. It has been shown that the values of attenuation parameters of gamma it bitter in the case of nanoparticles than case of the use of micro material.</p>
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
World Journal Ofexperimentalbiosciences
transformation of Saccharomyces cerevisiae by PET plasmid using lithium acetate
...Show More Authors