Preferred Language
Articles
/
oRc7FY4BVTCNdQwCADF3
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with respect to the conventional encryption techniques like RSA, DES, etc.

Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Copy Move Image Forgery Detection using Multi-Level Local Binary Pattern Algorithm
...Show More Authors

Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different

... Show More
Crossref
Publication Date
Wed Jan 15 2003
Journal Name
كلية الترا ث الجامعة
Estimating an Exponentiated Expanded Power Function Distribution Using an Artificial Intelligence Algorithm
...Show More Authors

The distribution of the expanded exponentiated power function EEPF with four parameters, was presented by the exponentiated expanded method using the expanded distribution of the power function, This method is characterized by obtaining a new distribution belonging to the exponential family, as we obtained the survival rate and failure rate function for this distribution, Some mathematical properties were found, then we used the developed least squares method to estimate the parameters using the genetic algorithm, and a Monte Carlo simulation study was conducted to evaluate the performance of estimations of possibility using the Genetic algorithm GA.

Publication Date
Fri Feb 20 2026
Journal Name
Journal Of Advanced Research Design
Sustainable Leaf Plant Disease Based on Salp Swarm Algorithm for Feature Selection
...Show More Authors

Sustainable plant protection and the economy of plant crops worldwide depend heavily on the health of agriculture. In the modern world, one of the main factors influencing economic growth is the quality of agricultural produce. The need for future crop protection and production is growing as disease-affected plants have caused considerable agricultural losses in several crop categories. The crop yield must be increased while preserving food quality and security and having the most negligible negative environmental impact. To overcome these obstacles, early discovery of satisfactory plants is critical. The use of Advances in Intelligent Systems and information computer science effectively helps find more efficient and low-cost solutions. Thi

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Ieee Transactions On Neural Systems And Rehabilitation Engineering
Transradial Amputee Gesture Classification Using an Optimal Number of sEMG Sensors: An Approach Using ICA Clustering
...Show More Authors

View Publication
Scopus (145)
Crossref (145)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Innovation, Creativity And Change
The importance of using the World Wide Web (the Internet) for professors of Arabic Language Department at the University of Baghdad‏
...Show More Authors

Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Journal Of The College Of Islamic Sciences
The translated text is a second launch of the text (Al-Kharja Al-Muwashah Al- Andalusian as an example
...Show More Authors

Literary translation is one of the most difficult types of translation ,because it conveys feelings that differ from one person to another, and since the language constitutes an obstacle to understanding the Andalusian excerpts, the translators resorted to translating it, and this was a second start to the text, different from its first start, is said from the tongue of the Al-washah , The muwashshah is a poetic art that appeared in Andalusia after the Arabs entered it ,characterized by special system It differs from the traditional Arabic poem, as it has a beginning represented in the beginning of the muwashshah and several equal parts ending with differentrhymes.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Fast neutrons Al-Hamdani utilization to solar cells performance
...Show More Authors

Been in this gravel study the effect of Alchgag fast neutrons emitted by the source on the electrical properties of silicon solar cells monounsaturated crystal at a constant rate of neutron flow rate of a wide range of neutron flow speed ranges for periods of time ranging from 2-10 hours

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 11 2022
Journal Name
Concurrency And Computation: Practice And Experience
Fast and accurate computation of high‐order Tchebichef polynomials
...Show More Authors

View Publication
Scopus (30)
Crossref (28)
Scopus Clarivate Crossref