Alaa Jabbar Qasim ALmaliki | University Utara Malaysia (original) (raw)
Uploads
Papers by Alaa Jabbar Qasim ALmaliki
International Journal of Advances in Computer Science and Technology, 2015
-3D printing or additive manufacturing is a process of making three dimensional solid objects fro... more -3D printing or additive manufacturing is a process of making three dimensional solid objects from a digital file. The creation of a 3D printed object is achieved using additive processes. In an additive process an object is created by laying down successive layers of material until the entire object is created. Each of these layers can be seen as a thinly sliced horizontal cross-section of the eventual object.
Journal of Theoretical and Applied Information Technology, 2021
As smart homes, factories, and farms developed, it has used sensors that communicate with wireles... more As smart homes, factories, and farms developed, it has used sensors that communicate with wireless signals such as Bluetooth mesh-low power node (M-LPN) with the wireless sensor network (WSN) system, which causes them to be interfered with by different signals coming from different sources, which causes them not to function properly. The Bluetooth M-LPN is critical that enables the wireless sensor network to function. t makes up the inter-node controller of a WSN and collects information about nodes and sends commands to them on behalf of the founder/client node. A mesh system uses each node as a sensor and repeater. This means that each node must always listen for, relay, and route network traffic. This most likely results in decreased battery life. This proposed takes advantage of Bluetooth M-LPNWSN systems and algorithmbased efficient approach by using label-based Ant Colony Optimization (ACO) in the clustering process for allocating routing. Theoretical analysis and simulation results show that the proposed algorithm has a better performance in terms of total routing length, number of hops, and communication load when compared with the other existing algorithms such as Artificial Neural Networks (ANNs) that were used with the Bluetooth low energy system.
International Journal of Engineering and Techniques, 2022
To evaluate a steganographic method and cover the variation in the data, the carrying capacity ... more To evaluate a steganographic method and cover the variation in the data, the carrying capacity of the cover data should be
addressed. In relation to this, the main purpose of steganographic method is to increase the capacity and the cover to reduce
variation in data. However, since the change in capacity and cover data is inversely proportional, these two purposes cannot be
achieved at the same time. As such, multi-layer steganography is used to keep the change in the cover data constant as well as
to increase the capacity. In this study, multi-layer image steganography will be discussed and compared with the non-multilayer
method
QALAAI ZANIST JOURNAL, 2021
An important type of digital media is images, and in this article, we are going to review how ima... more An important type of digital media is images, and in this article, we are going to review how images are represented and how they can be manipulated with simple mathematics. This is useful general knowledge for anyone who has a digital camera and a computer, but for many scientists, it is an essential tool. Printed publications use different formats to specify the properties of the information published; Thus, the uses that each type of each publication have been defined. Also, the formats of the digital images have been developed for use with a certain type of images and this article presents the benefits and uses of the different digital image formats.
Bulletin of Electrical Engineering and Informatics, 2020
This paper presents a review of the compression technique in digital image processing. As well as... more This paper presents a review of the compression technique in digital image processing. As well as a brief description of the main technologies and traditional format that commonly used in image compression. It can be defined as image compression a set of techniques that are applied to the images to store or transfer them in an effective way. In addition, this paper presents formats that use to reduce redundant information in an image, unnecessary pixels and non-visual redundancy. The conclusion of this paper The results for this paper concludes that image compression is a critical issue in digital image processing because it allows us to store or transmit image data efficiently.
Bulletin of Electrical Engineering and Informatics, 2020
This paper presents several techniques used in digital steganography in term of spatial and trans... more This paper presents several techniques used in digital steganography in term of spatial and transform domain. Additionally, it analyses the performance and the metric evaluation of the techniques used in digital steganography based on spatial and transform domain. This paper aims to identify the main mediums of digital steganography, which are image-based, video-based and audio-based, in order to recognize the various techniques used with them. As a result, the primary technique used in the digital medium was LSB technique in the spatial domain, while in the transform domain, the main technique used was differentiated between DTC and DWT. Meanwhile, the common domain utilized in digital steganography was the spatial domain due to its simplicity and high embedding capacity. The future efforts for this paper will be considering the feature based in text steganography. Keywords: Digital steganography Medium-based Performance metric Spatial domain Transform domain This is an open access article under the CC BY-SA license.
Bulletin of Electrical Engineering and Informatics, 2019
The present work carries out a descriptive analysis of the main steganography techniques used in ... more The present work carries out a descriptive analysis of the main steganography techniques used in specific digital media such as audio and image files. For this purpose, a literary review of the domains, methods, and techniques as part of this set was carried out and their functioning, qualities, and weaknesses are identified. Hence, it is concluded that there is a wide relationship between audio and image steganography techniques in their implementation form. Nevertheless, it is determined that LSB is one of the weakest techniques, but the safest and the most robust technique within each type of the presented medium.
International Journal of Engineering & Technology, 2019
This paper describes the types of pressure used to decrease the volume of data in lower media. Th... more This paper describes the types of pressure used to decrease the volume of data in lower media. This study is analyzed and categorized according to the two main types of study: Lossy Compression and Lossless compression. Each type has been studied through a number of transactions that determine the efficiency of compression files. The advantages and disadvantages for each type, which emerged from previous researches will also be discussed
International Journal of Engineering & Technology, 2019
Steganography is one area in information security that is able to conceal the secret message in a... more Steganography is one area in information security that is able to conceal the secret message in any media to avoid the intruders. In this paper, the review of steganography is done in certain media such as image, text, audio, and video. It analyses some of the techniques that applied steganography to discover the development of the techniques to cover a secret message. It is expected that this paper is able to describe the implementation of steganography by previous researchers on their efforts.
This paper reviews the method of classification of the types of images used in data concealment b... more This paper reviews the method of classification of the types of images used in data concealment based on the perspective of the researcher’s efforts in the past decade. Therefore, all papers were analyzed and classified according to time periods. The main objective of the study is to infer the best types of images that researchers have discussed and used, several reasons will be shown in this study, which started from 2006 to 2017, through this paper the pros and the cons in the use of favourite types in the concealment of data through previous studies.
Well I wrote the article about viruses and said that I will write this article about the types of... more Well I wrote the article about viruses and said that I will write this article about the types of attacks and how to protect yourself against these attacks. There are alot of different attacks but I'm going to cover only these: Eavesdropping-This is the process of listening in or overhearing parts of a conversation. It also includes attackers listening in on your network traffic. Its generally a passive attack, for example, a coworker may overhear your dinner plans because your speaker phone is set too loud. The opportunity to overhear a conversation is coupled with the carelessness of the parties in the conversation.
International Journal of Advances in Computer Science and Technology, 2015
-3D printing or additive manufacturing is a process of making three dimensional solid objects fro... more -3D printing or additive manufacturing is a process of making three dimensional solid objects from a digital file. The creation of a 3D printed object is achieved using additive processes. In an additive process an object is created by laying down successive layers of material until the entire object is created. Each of these layers can be seen as a thinly sliced horizontal cross-section of the eventual object.
Journal of Theoretical and Applied Information Technology, 2021
As smart homes, factories, and farms developed, it has used sensors that communicate with wireles... more As smart homes, factories, and farms developed, it has used sensors that communicate with wireless signals such as Bluetooth mesh-low power node (M-LPN) with the wireless sensor network (WSN) system, which causes them to be interfered with by different signals coming from different sources, which causes them not to function properly. The Bluetooth M-LPN is critical that enables the wireless sensor network to function. t makes up the inter-node controller of a WSN and collects information about nodes and sends commands to them on behalf of the founder/client node. A mesh system uses each node as a sensor and repeater. This means that each node must always listen for, relay, and route network traffic. This most likely results in decreased battery life. This proposed takes advantage of Bluetooth M-LPNWSN systems and algorithmbased efficient approach by using label-based Ant Colony Optimization (ACO) in the clustering process for allocating routing. Theoretical analysis and simulation results show that the proposed algorithm has a better performance in terms of total routing length, number of hops, and communication load when compared with the other existing algorithms such as Artificial Neural Networks (ANNs) that were used with the Bluetooth low energy system.
International Journal of Engineering and Techniques, 2022
To evaluate a steganographic method and cover the variation in the data, the carrying capacity ... more To evaluate a steganographic method and cover the variation in the data, the carrying capacity of the cover data should be
addressed. In relation to this, the main purpose of steganographic method is to increase the capacity and the cover to reduce
variation in data. However, since the change in capacity and cover data is inversely proportional, these two purposes cannot be
achieved at the same time. As such, multi-layer steganography is used to keep the change in the cover data constant as well as
to increase the capacity. In this study, multi-layer image steganography will be discussed and compared with the non-multilayer
method
QALAAI ZANIST JOURNAL, 2021
An important type of digital media is images, and in this article, we are going to review how ima... more An important type of digital media is images, and in this article, we are going to review how images are represented and how they can be manipulated with simple mathematics. This is useful general knowledge for anyone who has a digital camera and a computer, but for many scientists, it is an essential tool. Printed publications use different formats to specify the properties of the information published; Thus, the uses that each type of each publication have been defined. Also, the formats of the digital images have been developed for use with a certain type of images and this article presents the benefits and uses of the different digital image formats.
Bulletin of Electrical Engineering and Informatics, 2020
This paper presents a review of the compression technique in digital image processing. As well as... more This paper presents a review of the compression technique in digital image processing. As well as a brief description of the main technologies and traditional format that commonly used in image compression. It can be defined as image compression a set of techniques that are applied to the images to store or transfer them in an effective way. In addition, this paper presents formats that use to reduce redundant information in an image, unnecessary pixels and non-visual redundancy. The conclusion of this paper The results for this paper concludes that image compression is a critical issue in digital image processing because it allows us to store or transmit image data efficiently.
Bulletin of Electrical Engineering and Informatics, 2020
This paper presents several techniques used in digital steganography in term of spatial and trans... more This paper presents several techniques used in digital steganography in term of spatial and transform domain. Additionally, it analyses the performance and the metric evaluation of the techniques used in digital steganography based on spatial and transform domain. This paper aims to identify the main mediums of digital steganography, which are image-based, video-based and audio-based, in order to recognize the various techniques used with them. As a result, the primary technique used in the digital medium was LSB technique in the spatial domain, while in the transform domain, the main technique used was differentiated between DTC and DWT. Meanwhile, the common domain utilized in digital steganography was the spatial domain due to its simplicity and high embedding capacity. The future efforts for this paper will be considering the feature based in text steganography. Keywords: Digital steganography Medium-based Performance metric Spatial domain Transform domain This is an open access article under the CC BY-SA license.
Bulletin of Electrical Engineering and Informatics, 2019
The present work carries out a descriptive analysis of the main steganography techniques used in ... more The present work carries out a descriptive analysis of the main steganography techniques used in specific digital media such as audio and image files. For this purpose, a literary review of the domains, methods, and techniques as part of this set was carried out and their functioning, qualities, and weaknesses are identified. Hence, it is concluded that there is a wide relationship between audio and image steganography techniques in their implementation form. Nevertheless, it is determined that LSB is one of the weakest techniques, but the safest and the most robust technique within each type of the presented medium.
International Journal of Engineering & Technology, 2019
This paper describes the types of pressure used to decrease the volume of data in lower media. Th... more This paper describes the types of pressure used to decrease the volume of data in lower media. This study is analyzed and categorized according to the two main types of study: Lossy Compression and Lossless compression. Each type has been studied through a number of transactions that determine the efficiency of compression files. The advantages and disadvantages for each type, which emerged from previous researches will also be discussed
International Journal of Engineering & Technology, 2019
Steganography is one area in information security that is able to conceal the secret message in a... more Steganography is one area in information security that is able to conceal the secret message in any media to avoid the intruders. In this paper, the review of steganography is done in certain media such as image, text, audio, and video. It analyses some of the techniques that applied steganography to discover the development of the techniques to cover a secret message. It is expected that this paper is able to describe the implementation of steganography by previous researchers on their efforts.
This paper reviews the method of classification of the types of images used in data concealment b... more This paper reviews the method of classification of the types of images used in data concealment based on the perspective of the researcher’s efforts in the past decade. Therefore, all papers were analyzed and classified according to time periods. The main objective of the study is to infer the best types of images that researchers have discussed and used, several reasons will be shown in this study, which started from 2006 to 2017, through this paper the pros and the cons in the use of favourite types in the concealment of data through previous studies.
Well I wrote the article about viruses and said that I will write this article about the types of... more Well I wrote the article about viruses and said that I will write this article about the types of attacks and how to protect yourself against these attacks. There are alot of different attacks but I'm going to cover only these: Eavesdropping-This is the process of listening in or overhearing parts of a conversation. It also includes attackers listening in on your network traffic. Its generally a passive attack, for example, a coworker may overhear your dinner plans because your speaker phone is set too loud. The opportunity to overhear a conversation is coupled with the carelessness of the parties in the conversation.