Preferred Language
Articles
/
URb_kYwBVTCNdQwCl_2O
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cycle to increases the complexity of the algorithm detection. An additional shared key between the sender and the receiver is added which is applied before starting the encryption process, that key must be hex-decimal in order to increase the level of security and give enough time to delay the guessing of the secret text by the attackers.  The secret message data is concealed using one of the two techniques: either least significant bit (3-LSB) steganography or hiding in green and blue bits. To expedite the concealment process, the cover image is enhanced by applying a median filter, the median filter removes noise from the image while preserving its details. Finally, comparing the results of the two methods to determine which is better for the cover image in terms of PSNR metrics and hiding process time.

Crossref
View Publication
Publication Date
Tue Sep 30 2025
Journal Name
The Iraqi Journal For Information And Documentation Studies
The role of performance indicators in evaluating the performance of the University of Technology's Central Library
...Show More Authors

University libraries seek to evaluate their performance in order to correct their path and adjust it in the right direction. Therefore, they use (performance indicators), which are a tool used by institutions to evaluate the weaknesses and strengths in their work and the reasons for failure to achieve some goals sometimes. They convert (goals, procedures and actions) into a formula that can be measured mathematically, which contributes to the library determining the gap between its current performance and what those libraries are supposed to be on, clarifying the path that the library is following, controlling the risks that may befall it, and thus enhancing the process of continuous improvement to avoid areas of failure and weakness becaus

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 06 2013
Journal Name
Journal Of Educational And Psychological Researches
Awareness of children 's rights from the perspective of parents and educators kindergarten in the city of Baghdad
...Show More Authors

The subject of children's rights in the modern era of the priorities of educators , because the child in the community is the future , which is held by the hope which is the basis for society in the renaissance and progress so quickly communities to prove these rights through its various institutions and issued legislation and held numerous conferences and taking specialists the field of childhood Aatron aspects of this rights and Aasalunha including a benefit for children until tomorrow for the rights of children , psychological and social health and educational . Therefore, the current study focused on the awareness of parents and educators of children's rights as individuals most closely satisfying their needs and rights. The

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The method of ABC and it, s roules in the Determining the cost of the Project constraction sector
...Show More Authors

Abstract

The basic orientation of the research is an attempting to apply the cost determining method according in the contract sector projects for Al- Iraq ceneral company, that this subject has a big value according to its modernity and  its influence on the future  and the eaning of the company.

The research aims to find out the effect of the method for determining cost based on the activity in determining the cost of the construction sector projects.The research was conducted in Iraq General Company for the implementation of irrigation projects. Bani search on three assumptions, the first is (that the application of the method for determining the cost on the basis of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Infection And Immunity
The Periodontal Pathogen Porphyromonas gingivalis Preferentially Interacts with Oral Epithelial Cells in S Phase of the Cell Cycle
...Show More Authors
ABSTRACT<p> <named-content content-type="genus-species">Porphyromonas gingivalis</named-content> , a key periodontal pathogen, is capable of invading a variety of cells, including oral keratinocytes, by exploiting host cell receptors, including alpha-5 beta-1 (α5β1) integrin. Previous studies have shown that <named-content content-type="genus-species">P. gingivalis</named-content> accelerates the cell cycle and prevents apoptosis of host cells, but it is not known whether the cell cycle phases influence bacterium-cell interactions. The cell cycle distribution of oral keratinocytes was characterized by flow cytometry and BrdU (5-bro</p> ... Show More
View Publication
Scopus (12)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
A study the electrical properties of a Se:2.5%as thin films prepared by thermal cvaporation
...Show More Authors

thin films of se:2.5% as were deposited on a glass substates by thermal coevaporation techniqi=ue under high vacuum at different thikness

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Integral transforms defined by a new fractional class of analytic function in a complex Banach space
...Show More Authors
Abstract<p>In this effort, we define a new class of fractional analytic functions containing functional parameters in the open unit disk. By employing this class, we introduce two types of fractional operators, differential and integral. The fractional differential operator is considered to be in the sense of Ruscheweyh differential operator, while the fractional integral operator is in the sense of Noor integral. The boundedness and compactness in a complex Banach space are discussed. Other studies are illustrated in the sequel.</p>
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science (ijeecs)
A new smart approach of an efficient energy consumption management by using a machine-learning technique
...Show More Authors

Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s

... Show More
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Natural Language Processing For Requirement Elicitation In University Using Kmeans And Meanshift Algorithm
...Show More Authors

 Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Robot Arm Path Planning Using Modified Particle Swarm Optimization based on D* algorithm
...Show More Authors

Abstract

Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al

... Show More
View Publication Preview PDF
Crossref (8)
Crossref