Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
Integrative Relationship between the Picture and the Written Text in the Commercial Advertisement
...Show More Authors

There is no doubt that the   advertisement picture  and the written text play  a key role in the formation of the language of the communicative discourse as the main pillars of the design of commercial advertising and the main entrance for the  advertising message awareness... Hence the researcher chose the title of her research (Integrative Relationship between the Picture and the Written Text in the Printed Commercial Advertisement) starting from following questions: What is the relationship between the picture and the written text in the printed commercial declaration? Is there functional, aesthetic and interactive integration between them?

          &n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Breast Tumor Diagnosis Using Diode Laser in Near Infrared Region
...Show More Authors

In the last years, new non-invasively laser methods were used to detect breast tumors for pre- and postmenopausal females. The methods based on using laser radiation are safer than the other daily used methods for breast tumor detection like X-ray mammography, CT-scanner, and nuclear medicine.  

      One of these new methods is called FDPM (Frequency Domain Photon Migration). It is based on the modulation of laser beam by variable frequency sinusoidal waves. The modulated laser radiations illuminate the breast tissue and received from opposite side.

      In this paper the amplitude and the phase shift of the received signal were calculated according to the orig

... Show More
View Publication Preview PDF
Publication Date
Thu May 18 2023
Journal Name
College Of Islamic Sciences
Nouns and attributes And what the Kalamayons termed it
...Show More Authors

Many people, especially among the youth or scholars, wonder about the position of Islam or the scholars of faith on the terminology used by scholars of theology in a certain period of time, and then circulated by people throughout the times and to the present day, such as the terms (the old, the maker, the updated, the cause and the cause) and so on, and this What I felt myself while teaching this subject from some of the students, some of whom consider it blasphemy, and some of them consider it an innovation of speech, and so there were many questions about this subject, which led me to write and research it, after relying on God Almighty, although the research is not long due to the nature of This topic on the one hand, and because I d

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 22 2006
Journal Name
Journal Of Planner And Development
Optimizing the location of banks using the Gis
...Show More Authors

the banks are one of the public services that must be available in the city to ensure easy financial dealings between citizens and state departments and between the state departments with each other and between the citizens themselves and to ensure easy access to it, so it is very important to choose the best location for the bank, which can serve the largest number of The population achieves easy access. Due to the difficulty of obtaining accurate information dealing with the exact coordinates and according to the country's specific projection, the researcher will resort to the default work using some of the files available in the arcview program

View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
strong criminal capabilities، Using simulation .
...Show More Authors

The penalized least square method is a popular method to deal with high dimensional data ,where  the number of explanatory variables is large than the sample size . The properties of  penalized least square method are given high prediction accuracy and making estimation and variables selection

 At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
The Written Text in Conceptual Art (An Analytical Study)
...Show More Authors

The tagged research problem (the outputs of the written text in conceptual art) dealt with a comparative analytical study in the concept of conceptual art trends (land art - body art - art - language).

The study consisted of four chapters. The first chapter dealt with the theoretical framework, which was represented in presenting (the research problem), which raised the following question: What is the role of the written text in the transformations of the conceptual arts?

The first chapter included (the importance of research) and (research objectives) seeking to conduct comparative research in the written text within the trends of conceptual art as a moving phenomenon in art, and to reveal the variable written text in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 02 2022
Journal Name
Lark Journal
Iraq Wars: From A literary text to Social Context
...Show More Authors

This article investigates Iraq wars presentation in literature and media. The first section investigates the case of the returnees from the war and their experience, their trauma and final presentation of that experience. The article also investigates how trauma and fear is depicted to create an optimized image and state of fear that could in turn show Iraqi society as a traumatized society. Critics such as Suzie Grogan believes that the concept of trauma could expand to influence societies rather than one individual after exposure to trauma of being involved in wars and different major conflicts. This is reflected in Iraq as a country that was subjected to six comprehensive conflicts in its recent history, i.e. less than half a century; th

... Show More
Publication Date
Wed Jun 11 2025
Journal Name
Iraqi Journal For Computer Science And Mathematics
Topological Indices for the Resize Graph of (G<sub>2</sub>(3))
...Show More Authors

Indexes of topological play a crucial role in mathematical chemistry and network theory, providing valuable insights into the structural properties of graphs. In this study, we investigate the Resize graph of G2(3), a significant algebraic structure arising from the exceptional Lie group (G2) over the finite field F3. We compute several well-known topological indices, including the Zagreb indices, Wiener index, and Randić index, to analyze the graph's connectivity and complexity. Our results reveal intricate relationships between the algebraic structure of G2(3) and its graphical properties, offering a deeper understanding of its combinatorial and spectral characteristics. These findings contribute to the broader study of algebraic graph t

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
The absurdity of Orientalist thought and its deviation in interpretation Quranic text View and critique
...Show More Authors

The absurdity of Orientalist thought and its deviation in interpretation
Quranic text
View and critique

View Publication Preview PDF
Publication Date
Fri Feb 28 2020
Journal Name
Innovations In Pharmacy
Evaluating Factors Related to the Abuse of Oral Corticosteroids among Community Pharmacy Customers: Using Theory of Reasoned Action
...Show More Authors

Introduction: Although it is discouraged, community pharmacy customers can obtain oral corticosteroids (OCSs) without prescriptions from some community pharmacies in Iraq. Medication abuse is defined as the use of medication for non-medical reasons. Objectives: The study aimed to determine demographics, beliefs, and perceptions associated with the abuse of oral corticosteroids for non-illness reasons among community pharmacy customers. Methods: This cross-sectional study was conducted in fall 2018 in four provinces in Iraq. Customers of 19 community pharmacies asking for OCSs for themselves without a prescription were administered a paper survey. This study used the Theory of Reasoned Action (TRA) to measure the relation

... Show More
View Publication
Crossref (4)
Crossref