Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Slums and its implication on security in Baghdad
...Show More Authors

The research team seeks to study the phenomena of random housing in Iraqi society in general and Baghdad city in particular by standing on the causes behind this phenomena and its relation with security situation in Baghdad. The researchers adopted a theoretical and practical framework. The main objective is to diagnose the risks caused by the escalation of slums in Baghdad city. 

View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Sources of Threatening Educational Security: Means and Effects
...Show More Authors

Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educati

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication
Publication Date
Thu Dec 30 2021
Journal Name
Al-kindy College Medical Journal
COVID-19 and the Conspiracy Theories
...Show More Authors

The first known use of the term conspiracy theory dated back to the nineteenth century. It is defined as a theory that explains an event or set of circumstances as the result of a secret plot by usually powerful conspirators. It is commonly used, but by no means limited to, extreme political groups. Since the emergence of COVID-19 as a global pandemic in December 2019, the conspiracy theory was present at all stages of the pandemic.

Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Al-kindy College Medical Journal
COVID-19 and the Conspiracy Theories
...Show More Authors

The first known use of the term conspiracy theory dated back to the nineteenth century. It is defined as a theory that explains an event or set of circumstances as the result of a secret plot by usually powerful conspirators. It is commonly used, but by no means limited to, extreme political groups. Since the emergence of COVID-19 as a global pandemic in December 2019, the conspiracy theory was present at all stages of the pandemic.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (13)
Scopus Crossref
Publication Date
Sat Mar 14 2026
Journal Name
Magazine Of College Administration&economics For Economic & Administration & Financial Studies
The Design of Optimal Layout Using Computerized Relative Allocation of Facilities Technique (CRAFT) - Applied Research in Al-M'ammon Factory / The General Company for Vegetable Oils Industry
...Show More Authors

View Publication
Publication Date
Sat Mar 14 2026
Journal Name
Journal Of Physical Education
The Effect of Using Especial Exercises Suggested for Developing of Accuracy Direction by Fencing in Foil for the Players of the National Team of the Young who Handicap
...Show More Authors

View Publication
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
Using poetry in teaching Russian language in university of Baghdad / faculty of langu: Использование поэзии в процессе обучения русскому языку на кафедре русского языка факультета языков Багдадского университета
...Show More Authors

There are many methods of teaching foreign language to non-native speakers now therefore the discovery of new methods - which  make students understand the language , vocabulary & saves them as soon as possible – becomes one of  the most important duties of teachers and educators .

The personal experience shows that the teaching of the Russian language through memorizing    Russian poetry is   one of the fastest ways to master the language and know its rules and also    improve the   ability of translating vocabulary and being not able to  save the Russian words only  , but to make it complete too. Poetry is an article or text which loves by people and en

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
مجلة نسق
Honoring Parents and Relatives Between Christianity and Islam
...Show More Authors

Both religions have urged (honoring parents and kin) through the texts that came in their original sources, as honoring parents means showing respect to them In word and deed, and carrying in our hearts an appreciation for their status, and God commands to honor parents; Becausee this is Important in the eyes of God that he includeincludeed it in the Ten Commandmen.

Preview PDF