Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Engineering
Stator Faults Diagnosis and Protection in 3-Phase Induction Motor Based on Wavelet Theory
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Modern Applied Science
Hybrid Methodology for Image Segmentation Based on Active Contour Module and Alpha-Shape Theory
...Show More Authors

The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s

... Show More
Publication Date
Tue Oct 01 2024
Journal Name
Results In Chemistry
Microwave synthesis, density functional theory study and antiproliferative activity of the novel spiropyrazole derivatives
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon May 21 2007
Journal Name
Journal Of Planner And Development
Using the Input - Output Model in building the economic plan using the computer
...Show More Authors

The origin of this technique lies in the analysis of François Kenai (1694-1774), the leader of the School of Naturalists, presented in Tableau Economique. This method was developed by Karl Marx in his analysis of the Departmental Relationships and the nature of these relations in the models of " "He said. The current picture of this type of economic analysis is credited to the Russian economist Vasily Leontif. This analytical model is commonly used in developing economic plans in developing countries (p. 1, p. 86). There are several types of input and output models, such as static model, mobile model, regional models, and so on. However, this research will be confined to the open-ended model, which found areas in practical application.

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Psychological effects of electronic games In children and adolescents
...Show More Authors

The proliferation of electronic games, video games and computers has caused children and teenagers to become attracted to these games and become their favorite entertainment. The widespread of these games has generated widespread debate about positive aspects and negative aspects. It is evident that there are two main trends in the impact of electronic games on the behavior of children and adolescents. The first trend is that e-games have positive effects on children and adolescents, especially in cognitive abilities and skills in learning. While the second view sees that electronic games have negative effects that appear in social isolation and lack of movement and aggression. Through the review of previous literature, the current resea

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
The role of Adipocytokines, Vitamin D, and C in Colorectal Cancer
...Show More Authors

Colorectal cancer is the world's 3rd most frequent malignant neoplasm and the 4th most common cancer in Iraq. Leptin and Adiponectin are two major Adipocytokines produced by adipose cells that have opposite effects on the formation of colorectal tumors. Leptin induces tumor growth and metastasis, whereas Adiponectin inhibits it. 1,25-Dihydroxyvitamin D controls and limits cancer cell proliferation, differentiation, and survival. Vitamin C deficiency, on the other hand, has been regularly detected in cancer tissues and has potent anti-cancer properties. The purpose of this study was to look at the biochemical role of circulatory Adipocytokine levels (Adiponectin and Leptin) as well as the anti-cancer potentials of Vi

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Pairwise connectedness in $ check ${$text ${$C$}$$}$ $ ech fuzzy soft bi-closure spaces
...Show More Authors

The concept of Cech fuzzy soft bi-closure space ( ˇ Cfs bi-csp) ( ˇ U, L1, L2, S) is initiated and studied by the authors in [6]. The notion of pairwise fuzzy soft separated sets in Cfs bi-csp is defined in this study, and various features of ˇ this notion are proved. Then, we introduce and investigate the concept of connectedness in both Cfs bi-csps and its ˇ associated fuzzy soft bitopological spaces utilizing the concept of pairwise fuzzy soft separated sets. Furthermore, the concept of pairwise feebly connected is introduced, and the relationship between pairwise connected and pairwise feebly connected is discussed. Finally, we provide various instances to further explain our findings.

Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Student Conference On Research And Development
Feature extraction for co-occurrence-based cosine similarity score of text documents
...Show More Authors

View Publication
Scopus (11)
Crossref (10)
Scopus Crossref
Publication Date
Thu Nov 17 2022
Journal Name
Journal Of Information And Optimization Sciences
Hybrid deep learning model for Arabic text classification based on mutual information
...Show More Authors

View Publication
Crossref (6)
Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Kinetic, Isotherm and Thermodynamic Studies on the Ciprofloxacin Adsorption from Aqueous Solution Using Aleppo bentonite
...Show More Authors

          Aleppo bentonite was investigated to remove ciprofloxacin hydrochloride from aqueous solution. Batch adsorption experiments were conducted to study the several factors affecting the removal process, including contact time, pH of solution, bentonite dosage, ion strength, and temperature. The optimum contact time, pH of solution and bentonite dosage were determined to be 60 minutes, 6 and 0.15 g/50 ml, respectively. The bentonite efficiency in removing CIP decreased from 89.9% to 53.21% with increasing Ionic strength from 0 to 500mM, and it increased from 89% to 96.9% when the temperature increased from 298 to 318 K. Kinetic studies showed that the pseudo second-order model was the best in describing  the adsorption sys

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref