Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 19 2018
Journal Name
Arab Science Heritage Journal
فلسفة فلسفة اللغة و أثرها في الإعجاز القرآني
...Show More Authors

Praise be to God, prayer and peace upon our master Muhammad the Messenger of Allah peace be upon him mercy, gift, and grace, and rendered his family and the good righteous is followed until the Day of Judgment. After: The Koran

View Publication Preview PDF
Publication Date
Wed Sep 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
الثروة السمكية في العراق الواقع و الآفاق المستقبلية
...Show More Authors

Despite all the possibilities, owned by Iraq for the production of fish, but there is low in the level of production and in the rate of per capita consumption is due to inter alia, the weakness of investment, stop government support, a significant decline in the quantities of water, the high proportion of salinity and the proportion of pollution in the water, the use of means and fishing methods are primitive, weak laws and legislation, the policy of dumping markets imported products. Despite all this research has shown that there are investment opportunities very large in this sector through the size of the market and the absorptive capacity and the growth of per capita income and cultural revelation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 02 2023
Journal Name
Second International Conference On Innovations In Software Architecture And Computational Systems (isacs 2022)
Synthesis and characterization of SAPO-11 using carbon nanotubes
...Show More Authors

The thermal method was used to produce silicoaluminophosphate (SAPO-11) with different amounts of carbon nanotubes (CNT). XRD, nitrogen adsorption-desorption, SEM, AFM, and FTIR were used to characterize the prepared catalyst. It was discovered that adding CNT increased the crystallinity of the synthesize SAPO-11 at all the temperatures which studied, wile the maximum surface area was 179.54 m2/g obtained at 190°C with 7.5 percent of CNT with a pore volume of 0.317 cm3/g ,and with nano-particles with average particle diameter of 24.8 nm, while the final molar composition of the prepared SAPO-11 was (Al2O3:0.93P2O5:0.414SiO2).

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Predictive Significance of Interleukins 17A and 33 in Risk of Relapsing–Remitting Multiple Sclerosis
...Show More Authors

Cytokines are signaling molecules between inflammatory cells that play a significant role in the pathogenesis of a disease. Among these cytokines are interleukins (ILs) 17A and 33, and accordingly, the current case-control study sought to investigate the role of each of the two cytokines in the risk of developing multiple sclerosis (MS). Sixty-eight relapsing-remitting MS (RRMS) Iraqi patients and twenty healthy individuals (control group) were enrolled. Enzyme linked immunosorbent assay (ELISA) kits were used to determine serum levels of IL-17A and IL-33. Results revealed that IL-17A and IL-33 levels were significantly higher in MS patients than in controls (14.1 ± 4.5 vs. 7.5 ± 3.8 pg/mL; p < 0.001 and 65.3 ± 16

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Evaluation the Effects of CO2 Laser on Soft and Hard Tissues (in vitro study)
...Show More Authors

CO2 laser (10.6 μm) is the most often used laser in the oral surgery due to its high absorption by water of the oral tissues. Several benefits of the use of CO2 laser have been reported for oral surgical procedures. This study aims to evaluate the effect of CO2 laser on soft and hard oral tissues (in vitro study). This study was done on fresh tissues from sheep’s head. CO2Surgical Laser with different operation modes was used; 0.2 mm spot size using different laser parameters on the tongue, and bone making holes, incisions and cutting. The depths and widths of holes and incisions were measured using endodontic file under magnification. The speed of incisions was calculated and the required time for cutting was measured using sport clo

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
On Finitely Null-additive and Finitely Weakly Null-additive Relative to the σ–ring
...Show More Authors

     This article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.

View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the external auditor in assessing the security of information technology systems in light of (ISO/IEC 27001): (Applied research on a sample of private banks)
...Show More Authors

This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Baska Style in Achievement and Creative Thinking among Students in the Fifth Grade Literary Material and Application Rhetoric
...Show More Authors

The current research aims to identify the effect of Baska style on students’ achievement and the creative thinking in material rhetoric and the application of students for fifth grade literary. To achieve the study objectives, the researcher has designed an achievement test to measure group of students in the fifth grade literary in material application. The researcher chose a sample of 40 female students from Khansa School for Girls in Baghdad for the academic year (2014 - 2015), he applied the test on an exploratory sample consisted of 30 female students from the research community. The study resulted in being no statistically significant difference at the level of significance (0.05) between the mean scores of the experimental group

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ECONOMIC LOSSES CAUSED BY ROSE BEETLE MALADERA INSANABILIS (BRENSKE) ON FRUIT AND ORNAMENTAL PLANTS AND ITS CONTROL BY PATHOGENIC FUNGI: ECONOMIC LOSSES CAUSED BY ROSE BEETLE MALADERA INSANABILIS (BRENSKE) ON FRUIT AND ORNAMENTAL PLANTS AND ITS CONTROL BY PATHOGENIC FUNGI
...Show More Authors

The study aimed to evaluate injuries and economic losses which caused by rose beetle Maladerainsanabilis (Brenske) on ornamental and fruit plants as introduced insect in Iraq during 2015 and determine infested host plants in addition to evaluate efficacy of pathogenic fungi Metarhiziumanisopiliae (1x10⁹ spore/ ml) and Beauvariabassiana (1x10⁸spore/ ml) in mortality of insect larvae in laboratory and field.The results showed that the insect was polyphagous infested many host plants (20 host plant)Which caused degradation and dead the plants through adult feeding on leaves and flower but large injury caused by larvae feeding on root plants which caused obligate dead to infested plant, the percentage mortality of rose plants 68.6%, pear

... Show More
View Publication Preview PDF