Preferred Language
Articles
/
JxbtIIgBVTCNdQwCaXTN
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
PHYSICAL MODEL OF KEROSENE PLUME MIGRATION IN AN UNSATURATED ZONE OF THE SANDY SOIL
...Show More Authors

Physical model tests were simulated non-aqueous phase liquid (NAPL) spill in two-dimensional
domain above the water table. Four laboratory experiments were carried out in the sand-filled
tank. The evolution of the plume was observed through the transparent side of this tank and the
contaminant front was traced at appropriate intervals. The materials used in these experiments
were Al-Najaf sand as a porous medium and kerosene as contaminant.
The results of the experiments showed that after kerosene spreading comes to a halt (ceased) in
the homogeneous sand, the bulk of this contaminant is contained within a pancake-shaped lens
situated on top of the capillary fringe.

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (13)
Crossref (8)
Scopus Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Continuous Improvement Strategy (Kaizen) in organizational innovation: An analytical research in the General Company of Electrical and Electronic Industries /The Ministry of Industry and Minerals
...Show More Authors

This paper aims at the fact that most organizations today suffer from a waste of time, effort, and cost, and they have difficulty in achieving the best performance situations and compete strongly. The researcher distributed 108 questionnaires as a statistical analyzable sample society where the sample intentionally consists of general managers, department head, and division head. The questionnaire was formulated according to the Likert scale. The use of personal interviews and observations are additional tools for data collection and a number of statistical methods is used for data analysis such as simple regression and correlation coefficient (Pearson). One of the most prominent conclusions is that the company has adequate and c

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Smart Innovation, Systems And Technologies
The Effect of Exercises According to the Ranges of Arm Movement and Their Effect on Muscle Strength, and Some Biomechanical Variables, and Javelin Throwing Achievement for Young People
...Show More Authors

This present study is aimed at deciding the impact of exercises adapted to the ranges of movements of the arm on the performance of javelin throwing. As long as javelin throwing is quite a complex athletic event that presupposes a considerable amount of strength, speed, and biomechanical accuracy, it is crucial to learn whether the exercises designed to target the peculiarities of arm movements can have a positive effect on the performance of javelin throwers. To the study, experimental research with a single group of six youth javelin throwers was carried out. Before and after the eight-week training program, the pre-tests and post-tests were conducted to find the results of training with a specific focus on resistance exercises. Significa

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
A New Vision in the Locality and the Factors of Forming Meander
...Show More Authors

The research addressed an analytical field investigation of the locality of meander, the factors responsible of the locality of the meander at certain points of the stream other than others, and the role sequence of these factors in the formation process.
The research revealed that the location of forming the meander was associated closely with the scale structural composition of the bank materials from which the first stage of forming the curved stream, for the inhomogeneous or non-identical opposite banks in their scale structural composition saw an activity of differential corrosion, while the homogeneous and identical opposite banks in their scale structural composition saw an identical corrosion activity in its intensity at both

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 30 2021
Journal Name
Turkish Online Journal Of Qualitative Inquiry (tojqi)
A Pragmatic Study of the Student-Teacher Relationship in the Dangerous Minds
...Show More Authors

Preview PDF
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
The role of the strategic culture variable in negotiations (Brexit a model)
...Show More Authors

      Negotiations are distinguished in that they are an easy and simple means between the conflicting parties, and it is an effective means at the same time as the conflicting parties seek understanding on the most effective way to solve their dispute, but negotiations are not always appropriate to resolve international disputes, especially when there is a disparity in power between the negotiating countries, or when it is missing Goodwill, or even when one of the parties is absent or less flexible, and the internal circumstances of one of the conflicting countries may play a negative or positive role in the success of the negotiations, away from the influence of the role of external variables in that, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of Educational And Psychological Researches
A training program for chemistry teachers based on the knowledge economy and its impact on the productive thinking of their students
...Show More Authors

       The current research aims to build a training program for chemistry teachers based on the knowledge economy and its impact on the productive thinking of their students. To achieve the objectives of the research, the following hypothesis was formulated:

   There is no statistically significant difference at (0.05) level of significance between the average grades of the students participating in the training program according to the knowledge economy and the average grades of the students who did not participate in the training program in the test of productive thinking. The study sample consisted of (288) second intermediate grade students divided into (152) for the control group

... Show More
View Publication Preview PDF