Preferred Language
Articles
/
bsj-4530
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The impact of strategic approach in the effectiveness of small and medium Enterprises in Iraq
...Show More Authors

The purpose of this research highlight the achievement of the effectiveness of small and medium enterprises dimensions and conformable to analyze the relationship between business strategies and human resources management strategies , and launched search of a dilemma thought provoking fundamental questions revolve around the search is the lack of appropriate strategies in these enterprises to help them continuity and permanence in business and markets , as these enterprises lack the human resources management strategies appropriate , as well as business strategies that make them withstand the changes in the market environment is changing and volatile . It was to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 02 2014
Journal Name
Journal Of The Islamic University College
The image of the family in dubbed Turkish series and their potential impact on Iraqi youth
...Show More Authors

Since the nineties of the last century, Iraqi youth have been exposed to Mexican soap operas dubbed into classical Arabic, and the stories and ideas presented by these series were almost new to all the minds of the youth at that time, a culture completely different from the culture we have of social relations, and since the number of episodes was more than Of the 100 episodes, exposure to these series has left young people confused by the addiction to all their ideas and stories. They differ from the foreign films (mostly American) that we used to watch, and they only take two hours (at most). These films contain diverse stories and may be forgotten. Memory includes events and characters in their entirety at times, and you may remember th

... Show More
Publication Date
Wed Dec 29 2021
Journal Name
Journal Of The College Of Education For Women
The Effectiveness of Using Narrative Approach in Teaching the Course of Interpretation (Tafseer) in Developing the First Intermediate Female Students’ Conceptual Understanding
...Show More Authors

This study aims at examining the effectiveness of using the narrative approach in teaching the Interpretation of the Qur'an course in the development of conceptual comprehension among first-grade middle school female students. To achieve the objective of this study, a quantitative quasi-experimental design has been used. The sample consisted of first-grade middle school female students at "the third middle school" in Buraidah city, as this school suits the objective of the study. A test of conceptual understanding has been built by the researchers according to a list of conceptual understating skills at a significance level of α ≤ 0.05. Results have shown that there are statistically significant differences at the level (α ≤ 0,05)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Comparison between the empirical bayes method with moments method to estimate the affiliation parameter in the clinical trials using simulation
...Show More Authors

In this research the Empirical Bayes method is used to Estimate the affiliation parameter in the clinical trials and then we compare this with the Moment Estimates for this parameter using Monte Carlo stimulation , we assumed that the distribution of the observation is binomial distribution while the distribution with the unknown random parameters is beta distribution ,finally we conclude that the Empirical bayes method for the random affiliation parameter is efficient using Mean Squares Error (MSE) and for different Sample size .

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 10 2023
Journal Name
College Of Islamic Sciences
The Approach of Sheikh Abdul Qadir Al-Muhajir in Proving the Existence of God through his book (Rafa’ Al-Hajib fi Sharh ethbat Al-Wajib) An analytical study
...Show More Authors

This research is drawn from a doctoral dissertation, studying the approach of Sheikh Abd al-Qadir al-Muhajir al-Sanandji al-Kurdi (1303 AH) on the issue of proving the existence of God Almighty.
Sheikh Abd al-Qadir al-Sanandji was one of the scholars well versed in mental sciences. He has many books, all of them in the sciences of speech and wisdom, and among his books is the book (Raising the Eyebrow in Explanation of Ithbat al-Wajib), which is still a manuscript that has not been printed.
Through this book, the researcher studied the evidence of Sheikh Abdul Qadir to prove the existence of God Almighty, and compared it with the evidence of philosophers and theologians.
At the beginning, he presented a study on the import

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Crucial File Selection Strategy (CFSS) for Enhanced Download Response Time in Cloud Replication Environments
...Show More Authors

Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained an

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Apr 23 2021
Journal Name
International Journal Of Environmental Analytical Chemistry
Removal of levofloxacin and ciprofloxacin from aqueous solutions and an economic evaluation using the electrocoagulation process‏
...Show More Authors

For this research, the utilisation of electrocoagulation (EC) toremove theciprofloxacin (CIP) and levofloxacin (LVX) from aqueous solutions was examined. The effective removal efficiencies are 93.47% for CIP and 88.00% for LVX, under optimum conditions. The adsorption isotherm models with suitable mechanisms were applied to determine the elimination of CIP and LVX utilizingtheEC method. Thefindingsshowed the adsorption of CIP and LVX on iron hydroxide flocs followed the Sips isotherm, with correlation coefficient values (R2) of 0.939 and 0.937. Threekinetic models were reviewed to determine the accurate CIP and LVX elimination methods using the EC method. The results showed that itfittedfor the second-order model, which indicated that the c

... Show More
Scopus (51)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Fri Apr 23 2021
Journal Name
International Journal Of Environmental Analytical Chemistry
Removal of levofloxacin and ciprofloxacin from aqueous solutions and an economic evaluation using the electrocoagulation process‏
...Show More Authors

For this research, the utilisation of electrocoagulation (EC) toremove theciprofloxacin (CIP) and levofloxacin (LVX) from aqueous solutions was examined. The effective removal efficiencies are 93.47% for CIP and 88.00% for LVX, under optimum conditions. The adsorption isotherm models with suitable mechanisms were applied to determine the elimination of CIP and LVX utilizingtheEC method. Thefindingsshowed the adsorption of CIP and LVX on iron hydroxide flocs followed the Sips isotherm, with correlation coefficient values (R2) of 0.939 and 0.937. Threekinetic models were reviewed to determine the accurate CIP and LVX elimination methods using the EC method. The results showed that itfittedfor the second-order model, which indicated that the c

... Show More
Crossref (37)
Crossref
Publication Date
Fri Jan 31 2025
Journal Name
Passer Journal Of Basic And Applied Sciences
Enhanced Security Taxonomy for Fog-Enabled VANETs: A Comprehensive Survey on Attacks, Challenges, Applications and Architectures
...Show More Authors

Vehicular Ad Hoc Networks (VANETs) are integral to Intelligent Transportation Systems (ITS), enabling real-time communication between vehicles and infrastructure to enhance traffic flow, road safety, and passenger experience. However, the open and dynamic nature of VANETs presents significant privacy and security challenges, including data eavesdropping, message manipulation, and unauthorized access. This study addresses these concerns by leveraging advancements in Fog Computing (FC), which offers lowlatency, distributed data processing near-end devices to enhance the resilience and security of VANET communications. The paper comprehensively analyzes the security frameworks for fog-enabled VANETs, introducing a novel taxonomy that c

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Journal Of Engineering
A Comprehensive Review for Integrating Petrophysical Properties, Rock Typing, and Geological Modeling for Enhanced Reservoir Characterization
...Show More Authors

Reservoir characterization is an important component of hydrocarbon exploration and production, which requires the integration of different disciplines for accurate subsurface modeling. This comprehensive research paper delves into the complex interplay of rock materials, rock formation techniques, and geological modeling techniques for improving reservoir quality. The research plays an important role dominated by petrophysical factors such as porosity, shale volume, water content, and permeability—as important indicators of reservoir properties, fluid behavior, and hydrocarbon potential. It examines various rock cataloging techniques, focusing on rock aggregation techniques and self-organizing maps (SOMs) to identify specific and

... Show More
View Publication Preview PDF
Crossref (7)
Crossref