B Saleem, H Alwan, L Khalid, Journal of Engineering, 2011 - Cited by 2
In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreImage quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreAbstract
The basic aim of this research is to study the interactional effect of investing information technology on the relationship between value added intellectual capital and financial performance as literature review suggested on the theoretical level, including previous studies, with the deduction of its trends strongly predicted by research hypotheses and their content associated with the investment in intellectual capital after information technology tools being employed in this direction to improve the financial performance of the studied companies at the levels of both industrial and service sectors, a non-random sample was chosen included (40) forty Iraqi Joint-Stoc
... Show MoreUnconfined compressive strength (UCS) of rock is the most critical geomechanical property widely used as input parameters for designing fractures, analyzing wellbore stability, drilling programming and carrying out various petroleum engineering projects. The USC regulates rock deformation by measuring its strength and load-bearing capacity. The determination of UCS in the laboratory is a time-consuming and costly process. The current study aims to develop empirical equations to predict UCS using regression analysis by JMP software for the Khasib Formation in the Buzurgan oil fields, in southeastern Iraq using well-log data. The proposed equation accuracy was tested using the coefficient of determination (R²), the average absolute
... Show MoreThis research a study model of linear regression problem of autocorrelation of random error is spread when a normal distribution as used in linear regression analysis for relationship between variables and through this relationship can predict the value of a variable with the values of other variables, and was comparing methods (method of least squares, method of the average un-weighted, Thiel method and Laplace method) using the mean square error (MSE) boxes and simulation and the study included fore sizes of samples (15, 30, 60, 100). The results showed that the least-squares method is best, applying the fore methods of buckwheat production data and the cultivated area of the provinces of Iraq for years (2010), (2011), (2012),
... Show MoreThe current research deals with the argument of delusion and interpretation in the direction structure and its reflected impact in the reception activity and the amount of conceptual displacement it is subjected to in an aesthetic approach to abstract conceptual definitions of the reception activity , by the effect of this dialectic in the direction structure, which can be summed up by the following question: (What are the characteristics of the direction structure of the imaginary and what is the argument of interpretation in the theatre reception activity?) in order to stand on the aesthetic framework and conceptual definition of the direction structure in the controversy of interpretation and imagination, and its impact on the concept
... Show MoreThe peculiarity of worship spaces in the Islamic architecture is evident by its symbolic connotations with doctrinal connections, thus the niche has a major status in that symbolic connotation, which transformed due to the cultural interaction from a rock on the wall directed towards Mecca into an element of integrated structural entity with performative and aesthetic characteristics. The spread of the Islamic religion contributed to subjecting it to a design acculturation process, thus the problem of the research was raised by the following question: has the evolutionary tendency of acculturation been able to effect a major transformation in the niche design? The research aims at identifying the design acculturation and its translation
... Show MoreThe capital in the bank is the important element in establishing it, because it maintains the banking sector in the event of exposure to losses or risks In addition to contributing to the provision of liquidity And protection of depositors' money from potential and unexpected losses. There is also a relationship between the prices of shares and the indicators of the durability of the capital owned, considering that the shares are the components of the bank capital The study limited the indicators of capital to assets and capital to deposits, capital to loans and financial investments Where the most important conclusions are the damage to the detriment of shareholders in contrast to the depositors in the case of increasing the propo
... Show MoreBackground: Little is known about asymmetry of children's dental arches, the purpose of this study was to verify the presence of asymmetry of dental arches among Iraqi children in the mixed dentition stage. Materials and methods: The sample included 52 pairs of dental casts, 27 pairs belong to males and 25 pairs for females. Three linear distances were utilized on each side on the dental arch: Incisal-canine distance, canine-molar distance and incisal-molar distance, which represent the dental arch segmental measurements using the digital sliding calipers, which is accurate up to 0.02 mm. Results: No significant sides' differences with high correlation coefficient were found between the right and left incisal-canine, canine-molar and in
... Show More