Preferred Language
Articles
/
kxfQPo8BVTCNdQwCmWU6
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current techniques have not been successful in attaining more improved security caused by the non-encrypted data that only underwent the first layer of concealment through merely a straightforward embedment process of the secret data within the images, thus allowing the extraction of the concealed data to be quite simple for hostile entities. Hence, in the current study, the proposed scheme, we have improved the Bit Inverting Map method to narrow the gap of existing work. Our experimental results indicate that the proposed framework maintains a better balance between image visual quality and security, with relatively less computational and complexity, which assures its effectiveness compared to other state-of-the-art methods.

Publication Date
Tue Mar 31 2020
Journal Name
College Of Islamic Sciences
Ruling on conducting a marriage contract through modern means of communication Juristic study
...Show More Authors

 

This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.

It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values ​​and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.<

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Rationalization of Decision –Making and Performance evaluation methods through Employing Strategic Management Accounting
...Show More Authors

This research dealt with the process of reducing costs through some strategic methods of management accounting targeted cost analysis unassembled and Alkeisen, where he focused this research through his theory on a review of some administrative accounting strategic technologies, while the second practical side through the application of targeted cost analysis unassembled and Alkeisen, acquired Search importance of focusing on the decisions to cut costs, through the use of some administrative accounting strategic methods and this we can unassembled analysis, continuous improvement, and the cost of quality) when applied quality, "in light of this has been reached to a set of conclusions that the most important of the  company's relian

... Show More
View Publication
Crossref
Publication Date
Sat Mar 01 2025
Journal Name
Results In Engineering
Advancing asphalt binder performance through nanomaterial and polymer modification: Experimental and statistical insights
...Show More Authors

View Publication
Scopus (24)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Chemphyschem
Spherical Aromaticity of Tetrahedral Pnictogens Through <i>Off</i> ‐Nucleus Isotropic Magnetic Shielding
...Show More Authors

This work revealed the spherical aromaticity of some inorganic E4 cages and their protonated E4H+ ions (E=N, P, As, Sb, and Bi). For this purpose, we employed several evaluations like (0D-1D) nucleus independent chemical shift (NICS), multidimensional (2D-3D) off-nucleus isotropic shielding σiso(r), and natural bond orbital (NBO) analysis. The magnetic calculations involved gauge-including atomic orbitals (GIAO) with two density functionals B3LYP and WB97XD, and basis sets of Jorge-ATZP, 6-311+G(d,p), and Lanl2DZp. The Jorge-ATZP basis set showed the best consistency. Our findings disclosed non-classical aromatic characters in the above molecules, which decreased from N to Bi cages. Also, the results showed more aromaticity in E4 than E4H+

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Numerical Modeling of Water Movement from Buried Vertical Ceramic Pipes through Coarse Soils
...Show More Authors

Problem of water scarcity is becoming common in many parts of the world.  Thus to overcome this problem proper management of water and an efficient irrigation systems are needed.  Irrigation with buried vertical ceramic pipe is known as a very effective in management of irrigation water.  The two- dimensional transient flow of water from a buried vertical ceramic pipe through homogenous porous media is simulated numerically using the software HYDRUS/2D to predict empirical formulas that describe the predicted results accurately.   Different values of pipe lengths and hydraulic conductivity were selected.  In addition, different values of initial volumetric soil water content were assumed in this simulation a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Apr 09 2018
Journal Name
Al-khwarizmi Engineering Journal
Creating Through Points in Linear Function with Parabolic Blends Path by Optimization Method
...Show More Authors

The linear segment with parabolic blend (LSPB) trajectory deviates from the specified waypoints. It is restricted to that the acceleration must be sufficiently high. In this work, it is proposed to engage modified LSPB trajectory with particle swarm optimization (PSO) so as to create through points on the trajectory. The assumption of normal LSPB method that parabolic part is centered in time around waypoints is replaced by proposed coefficients for calculating the time duration of the linear part. These coefficients are functions of velocities between through points. The velocities are obtained by PSO so as to force the LSPB trajectory passing exactly through the specified path points. Also, relations for velocity correction and exact v

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Aug 31 2025
Journal Name
International Journal Of Sustainable Development And Planning
Analysis of Environmental and Socio-Economic Impacts of Dams Through Sustainable Management Strategies
...Show More Authors

The study aims to enrich the information of planners, policymakers, and water resources managers for planning and operating dams. This research aims to address the following question: What are the environmental, economic, and social impacts of the construction and operation of dams on the environment and society? The study assumes that good management is the ideal solution to solve the problems of negative effects resulting from the construction and operation of dams. The research relied on the descriptive analytical approach in studying the positive and negative impacts of Haditha Dam and the government's role. A questionnaire was conducted for 30 specialists in urban and regional planning to find out the most important strategies for sust

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Jun 30 2025
Journal Name
مجلة ميسان للدراسات الاكاديمية
The poetic image in the Diwan of Al-Oqaisher Al-Asadi
...Show More Authors

Preview PDF
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Tue Jan 17 2012
Journal Name
Journal Of The College Of Basic Education
Image Retrieval Using DCT/KWT and D4/KWT in Distributed System
...Show More Authors

This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff

... Show More
Preview PDF