Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Using Information and Communication Technology to Improving the Quality of Blended Learning Elements’, a Survey Study at the Technical College of Management /Baghdad
...Show More Authors

 The research has been based on two main variables (information and communication technology) and the quality of blended education (physical and electronic), aiming to reveal the relationship between four dimensions (physical devices, software, databases, communication networks) and the elements of education represented by (the teacher, the student, the teaching process, curriculum).  The methodology and post-analysis-based research were conducted at the Technical College of Management / Baghdad through polling the opinions of a random sample that included (80) teachers out of (86) and the number of students (276) representing a random sample from all departments of the college (for the morning study) out of (3500) stud

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal Of Laser
Low Fistula in Ano Treatment using Diode Laser 980nm
...Show More Authors

Anal fistula is an anorectal condition with over 90% of cases being
cryptoglandular in origin and occurring after anorectal abscesses. The traditional method of
treatment of an anal fistula is by excision or de roofing the tract awaiting complete healing.. Aim:
The aim of this study is to assess the efficacy of diode laser 980 nm in the treatment of low fistula in
ano. Methods: The study was performed between June 2019 to end of September 2019, at the
institute of laser for postgraduate study in Baghdad university. A cohort of ten male patients with a
provisional diagnosis of low type anal fistula were selected for this study and treated by interstitial
photothermal therapy of fistula epithelium by diode laser 980nm

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Path Planning of an autonomous Mobile Robot using Swarm Based Optimization Techniques
...Show More Authors

This paper presents a meta-heuristic swarm based optimization technique for solving robot path planning. The natural activities of actual ants inspire which named Ant Colony Optimization. (ACO) has been proposed in this work to find the shortest and safest path for a mobile robot in different static environments with different complexities. A nonzero size for the mobile robot has been considered in the project by taking a tolerance around the obstacle to account for the actual size of the mobile robot. A new concept was added to standard Ant Colony Optimization (ACO) for further modifications. Simulations results, which carried out using MATLAB 2015(a) environment, prove that the suggested algorithm outperforms the standard version of AC

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
The role of Adipocytokines, Vitamin D, and C in Colorectal Cancer
...Show More Authors

Colorectal cancer is the world's 3rd most frequent malignant neoplasm and the 4th most common cancer in Iraq. Leptin and Adiponectin are two major Adipocytokines produced by adipose cells that have opposite effects on the formation of colorectal tumors. Leptin induces tumor growth and metastasis, whereas Adiponectin inhibits it. 1,25-Dihydroxyvitamin D controls and limits cancer cell proliferation, differentiation, and survival. Vitamin C deficiency, on the other hand, has been regularly detected in cancer tissues and has potent anti-cancer properties. The purpose of this study was to look at the biochemical role of circulatory Adipocytokine levels (Adiponectin and Leptin) as well as the anti-cancer potentials of Vi

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Bayesian Tobit Quantile Regression Model Using Double Adaptive elastic net and Adaptive Ridge Regression
...Show More Authors

     Recently Tobit  Quantile Regression(TQR) has emerged as an important tool in statistical analysis . in order to improve the parameter estimation in (TQR) we proposed Bayesian hierarchical model with double adaptive elastic net technique  and Bayesian hierarchical model with adaptive ridge regression technique .

 in double adaptive elastic net technique we assume  different penalization parameters  for penalization different regression coefficients in both parameters λ1and  λ, also in adaptive ridge regression technique we assume different  penalization parameters for penalization different regression coefficients i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 01 2012
Journal Name
Ijcsi International Journal Of Computer Science
Implementing a novel approach an convert audio compression to text coding via hybrid technique
...Show More Authors

Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 08 2023
Journal Name
Iraqi Journal Of Laser
PDF Sensing and differentiation between normal flora and pathogenic of E.coli Bacteria using 410 nm diode laser
...Show More Authors

Abstract: Background: Optical biosensors offer excellent properties and methods for detecting bacteria when compared to traditional analytical techniques.  It allows direct detection of many biological and chemical materials.  Bacteria are found in the human body naturally non-pathogenic and pathologically, as they are found in other living organisms.  One of these bacteria is Escherichia coli (E. coli) which are found in the human body in its natural and pathogenic form. E.coli bacteria cause many diseases, including Stomach, intestines, urinary system infections, and others. The aim of this study: is sensing and differentiation between normal flora and pathogenic E.coli. Material and method:

... Show More
View Publication Preview PDF