Preferred Language
Articles
/
jcoeduw-726
Steganographic scheme to avoid statistical Steganalysis
...Show More Authors

significant bits either in the spatial domain or frequency domain sequentially or pseudo
randomly through the cover media (Based on this fact) statistical Steganalysis use different
techniques to detect the hidden message, A proposed method is suggested of a stenographic
scheme a hidden message is embedded through the second least significant bits in the
frequency domain of the cover media to avoid detection of the hidden message through the
known statistical Steganalysis techniques.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Ieee Transactions On Circuits And Systems Ii: Express Briefs
Adaptive Multibit Crosstalk-Aware Error Control Coding Scheme for On-Chip Communication
...Show More Authors

The presence of different noise sources and continuous increase in crosstalk in the deep submicrometer technology raised concerns for on-chip communication reliability, leading to the incorporation of crosstalk avoidance techniques in error control coding schemes. This brief proposes joint crosstalk avoidance with adaptive error control scheme to reduce the power consumption by providing appropriate communication resiliency based on runtime noise level. By switching between shielding and duplication as the crosstalk avoidance technique and between hybrid automatic repeat request and forward error correction as the error control policies, three modes of error resiliencies are provided. The results show that, in reduced mode, the scheme achie

... Show More
View Publication
Scopus (11)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Thu Mar 05 2020
Journal Name
Irrigation And Drainage
ECONOMIC ASSESSMENT OF DUYRIDGE DAM AS A WATER‐HARVESTING SCHEME IN IRAQ
...Show More Authors
Abstract<p>Iraq, home of the Tigris and Euphrates rivers, has survived an extreme deficiency of surface water assets over the years. The gap is due to the decline of the Iraqi water share every year, as well as a high demand for water use from different sectors, particularly agriculture.</p><p>Dam development has long given significant economic benefits to Iraq in circulating low‐priced electricity and supporting low‐income farmers by supplying them with a free irrigation system (Zakaria et al, 2012). This encouraged domestic consumption and investment.</p><p>Despite the fact that numerous advantages are expected from dam construction, it should be painstakingly assessed, utilizing cost</p> ... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2015
Journal Name
The Sai 2015
An optimal defuzzification method for interval type-2 fuzzy logic control scheme
...Show More Authors

Scopus (11)
Crossref (7)
Scopus Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Molecular detection of the ability of Biosynthesized Titanium dioxide nanoparticles to curing some genes of virulence factors of Entamoeba histolytica
...Show More Authors

The present study included the microscopic and molecular identification of Entamoeba histolytica by using specific primers to detect four virulence factors possessed by Entamoeba histolytica. Virulence factors included Active Cysteine proteinase, Galactose/N-acetyl-D-galactose-lectin, Amoeba pore C and Phospholipase. Titanium dioxide nanoparticles (TiO2NPs) were synthesized from Pseudomonas aeruginosa which producing Pyocyanin pigment as a reducing agent to form it. After that we studied the ability ofTiO2NPs to inhibit virulence factors production and curing the genes responsible for encoding them by using four different dose 2 ,3, 4, 6 mg/Kg and administered by intraperitoneal injection

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Detecting Suicidal Tendencies among Secondary School Students
...Show More Authors

The current research aims to detect the level of suicidal tendencies among secondary school students in terms of gender and educational stage (intermediate school students and high school students). The researcher adopted Al Hafeez's (2017) scale for suicidal tendencies, it consists of (57) items including six domains, namely: suicidal ideation, social motives for suicide, tendency to self-harm, desire for death, indifference and pessimism about life, willingness to commit suicide. The scale was modified to be (42) items after it was exposed to a group of experts. The scale was applied to a sample of (200) male and female students from secondary schools in Baghdad Governorate (Karkh - Rusafa) for the academic year 2021-2022. The results

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detecting Textual Propaganda Using Machine Learning Techniques
...Show More Authors

Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation.  Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota

... Show More
View Publication Preview PDF
Scopus (27)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Statistical Model for Predicting the Optimum Gypsum Content in Concrete
...Show More Authors

The problem of internal sulfate attack in concrete is widespread in Iraq and neighboring countries.This is because of the high sulfate content usually present in sand and gravel used in it. In the present study the total effective sulfate in concrete was used to calculate the optimum SO3 content. Regression models were developed based on linear regression analysis to predict the optimum SO3 content usually referred as (O.G.C) in concrete. The data is separated to 155 for the development of the models and 37 for checking the models. Eight models were built for 28-days age. Then a late age (greater than 28-days) model was developed based on the predicted optimum SO3 content of 28-days and late age. Eight developed models were built for all

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 03 2016
Journal Name
Technology Reports Of Kansai University
Some statistical results for solution type of the Inequalities system
...Show More Authors

Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
Statistical Analysis of Metal Removal during Magnetic Abrasive Finishing Process
...Show More Authors

This work aims to provide a statistical analysis of metal removal during the Magnetic Abrasive Finishing process (MAF) and find out the mathematical model which describes the relationship between the process parameters and metal removal, also estimate the impact of the parameters on metal removal. In this study, the single point incremental forming was used to form the truncated cone made of low carbon steel (1008-AISI) based on the Z-level tool path. Then the finishing was accomplished using a magnetic abrasive process based on the Box-Behnken design of the experiment using Minitab 17 software was used to finish the surface of the formed truncated cone. The influences of different parameters (feed rate, machining step s

... Show More
View Publication Preview PDF
Crossref (5)
Crossref