Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Bulletin Of Mathematics And Statistics Research
GRAPH OF EQUIVALENCE CLASSES OF A COMMUTATIVE IS-ALGEBRA
...Show More Authors

Publication Date
Fri Jun 06 2025
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
Some parameters for the resize graph of G2(4)
...Show More Authors

Topological indices provide important insights into the structural characteristics of molecular graphs. The present investigation proposes and explores a creative graph on a finite group G, which is known as the RIG. This graph is designated as ΓRS G2(4) indicating a simple undirected graph containing elements of G. Two distinct ertices are regarded as nearly the same if and only if their sum yields a non-trivial involution element in G. RIGs have been discovered in various finite groups. We examine several facets of the RIG by altering the graph through the conjugacy classes of G. Furthermore, we investigate the topological indices as applications in graph theory applying the distance matrix of the G2(4) group.

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Apr 06 2014
Journal Name
Journal Of Educational And Psychological Researches
Effectiveness of cooperative learning in at the implementation of floral material for celli graph and decoration
...Show More Authors

The purpose of this resesrh know (the effectiveness of cooperative lerarning implementation of floral material for calligraphy and ornamentation) To achieve the aim of the research scholar put the two zeros hypotheses: in light of the findings of the present research the researcher concluded a number of conclusions, including: -
1 - Sum strategy helps the learner to be positive in all the information and regulations, monitoring and evaluation during the learning process.
2 - This strategy helps the learner to use information and knowledge and their use in various educational positions, and to achieve better education to increase its ability to develop thinking skills and positive trends towards the article.
In light of this, the

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using financial and non-financial information ) SASB standards) to enhance investor confidence
...Show More Authors

Companies seek to enhance investor confidence by achieving the highest level of transparency in disclosure of financial and non-financial information (SASB standards) for Iraqi insurance companies listed on the financial market. The aim of the research is to identify the extent of the ability of financial and non-financial information to enhance transparency in reporting, which is reflected in Investor confidence. And the standards of sustainability development accounting issued by (SASB) through the electronic questionnaire that was distributed. Companies seek to achieve a set of goals, the most important of which is to enhance investor confidence by improving transparency in disclosure. Concerning the employment of financial an

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
An Analytic Solution for Riccati Matrix Delay Differential Equation using Coupled Homotopy-Adomian Approach
...Show More Authors

An efficient modification and a novel technique combining the homotopy concept with  Adomian decomposition method (ADM) to obtain an accurate analytical solution for Riccati matrix delay differential equation (RMDDE) is introduced  in this paper  . Both methods are very efficient and effective. The whole integral part of ADM is used instead of the integral part of homotopy technique. The major feature in current technique gives us a large convergence region of iterative approximate solutions .The results acquired by this technique give better approximations for a larger region as well as previously. Finally, the results conducted via suggesting an efficient and easy technique, and may be addressed to other non-linear problems.

View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Wed Apr 06 2022
Journal Name
Neuroquantology
Theoretical Study of Photons Spectra around High Energy of Quark-antiquark Using QCD Theory
...Show More Authors

In this paper, we study and investigate the quark anti-quark interaction mechanism through the annihilation process. The production of photons in association with interaction quark and gluon in the annihilation process. We investigate the effect of critical temperature, strength coupling and photons energy in terms of the quantum chromodynamics model theory framework. We find that the use of large critical temperature Tc =134 allows us to dramatically increase the strength coupling of quarks interaction. Its sensitivity to decreasing in photons rate with respect to strength coupling estimates. We also discuss the effect of photons energy on the rate of the photon , such as energies in range (1.5 to 5 GeV).The photons rate increases

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Journal Of The College Of Languages (jcl)
СЕМАНТИЧЕСКИЕ ОТНОШЕНИЯ ПАРАДИГМЫ ТЕКСТА В НАУЧНОЙ ЛИТЕРАТУРЕ РУССКОГО ЯЗЫКА
...Show More Authors

Аннотация: В данной статье исследуется проблема семантики текстовой парадигмы как одного из активных вопросов языковой науки о тексте, рассматриваются семантические отношения и их роль в раскрытии тех смысловых связей, на основе которых можно отличать типы семантических отношений «синонимия, антонимия, полисемия», выдвигается положение о семантических отношен

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Efficiency Measurement Model for Postgraduate Programs and Undergraduate Programs by Using Data Envelopment Analysis
...Show More Authors

Measuring the efficiency of postgraduate and undergraduate programs is one of the essential elements in educational process. In this study, colleges of Baghdad University and data for the academic year (2011-2012) have been chosen to measure the relative efficiencies of postgraduate and undergraduate programs in terms of their inputs and outputs. A relevant method to conduct the analysis of this data is Data Envelopment Analysis (DEA). The effect of academic staff to the number of enrolled and alumni students to the postgraduate and undergraduate programs are the main focus of the study.

 

View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Tue Mar 19 2013
Journal Name
Journal Of Semitic Studies
An Aramaic Incantation Text
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref