Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Study the Nuclear Structure of Some Even-Even Ca Isotopes Using the Microscopic Theory
...Show More Authors

The root-mean square-radius of proton, neutron, matter and charge radii, energy level, inelastic longitudinal form factors, reduced transition probability from the ground state to first-excited 2+ state of even-even isotopes, quadrupole moments, quadrupole deformation parameter, and the occupation numbers for some calcium isotopes for A=42,44,46,48,50 are computed using fp-model space and FPBM interaction. 40Ca nucleus is regarded as the inert core for all isotopes under this model space with valence nucleons are moving throughout the fp-shell model space involving 1f7/2, 2p3/2, 1f5/2, and 2p1/2 orbits. Model space is used to present calculations using FPBM intera

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Planner And Development
The "actor network theory" approach in dealing with landscapes in historical centers
...Show More Authors

The historical center's landscape suffers from neglect, despite their importance and broad capabilities in enhancing the cultural value of the historical center, as landscape includes many heterogeneous human and non-human components, material and immaterial, natural and manufactured, also different historical layers, ancient, modern and contemporary. Due to the difference in these components and layers, it has become difficult for the designer to deal with it. Therefore, the research was directed by following a methodology of actor-network theory as it deals with such a complex system and concerned with an advanced method to connect the various components of considering landscape as a ground that can include various elements and deal wi

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
New and Existing Approaches Reviewing of Big Data Analysis with Hadoop Tools
...Show More Authors

Everybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, sc

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Int. J. Nonlinear Anal. Appl.
Feeble regular and feeble normal spaces in α-topological spaces using graph
...Show More Authors

This paper introduces some properties of separation axioms called α -feeble regular and α -feeble normal spaces (which are weaker than the usual axioms) by using elements of graph which are the essential parts of our α -topological spaces that we study them. Also, it presents some dependent concepts and studies their properties and some relationships between them.

Preview PDF
Scopus (1)
Scopus Clarivate
Publication Date
Wed Nov 21 2018
Journal Name
Al–bahith Al–a'alami
Remediation of the Administrative Corruption Issues in accordance to the Theory of News Frames
...Show More Authors

Media, especially press plays an important role in fighting corruption and tackling this phenomenon, which has become widespread in our society, through its effective role in raising awareness of the seriousness of spreading of corruption of all its forms in society.
All international conventions and agreements stress the necessity of the role of media and its importance in the light of corruption. All countries also commit themselves to the necessity of guaranteeing the freedom of media and the circulation of information and preparing it as a prerequisite for activating the People’s Control Mechanism and supporting measures and means to prevent and combat financial and administrative corruption more actively and effectively.
Co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Communications In Computer And Information Science
Automatically Recognizing Emotions in Text Using Prediction by Partial Matching (PPM) Text Compression Method
...Show More Authors

In this paper, we investigate the automatic recognition of emotion in text. We perform experiments with a new method of classification based on the PPM character-based text compression scheme. These experiments involve both coarse-grained classification (whether a text is emotional or not) and also fine-grained classification such as recognising Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method significantly outperforms the traditional word-based text classification methods. The results show that the PPM compression based classification method is able to distinguish between emotional and nonemotional text with high accuracy, between texts invo

... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Mar 26 2023
Journal Name
Wasit Journal Of Pure Sciences
Pure Graph of a Commutative Ring
...Show More Authors

A new definition of a graph called Pure graph of a ring denote Pur(R) was presented , where the vertices of the graph represent the elements of R such that there is an edge between the two vertices ???? and ???? if and only if ????=???????? ???????? ????=????????, denoted by pur(R) . In this work we studied some new properties of pur(R) finally we defined the complement of pur(R) and studied some of it is properties

View Publication Preview PDF
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Article Structural violence: A study In Johann Galtung's theory of explanation he violence t
...Show More Authors

This study deals with the subject of violence, but from another perspective, it has not been emphasized in contemporary studies of violence in Arabic and raqi universities, which is the structural or institutional aspect of violence. Traditional studies have focused their analysis of violence on the direct side the violence, The other side of the violence is the hidden violence, which is characterized by a lack of clarity of the underlying factors and its effects are not arises, which makes it the most serious violence, which requires a deep research into the social, political, economic, cultural and psychological structure of society (individuals and institutions). This study was based on the theory of the Norwegian scientist (J

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Comparison Study of Electromyography Using Wavelet and Neural Network
...Show More Authors

In this paper we present a method to analyze five types with fifteen wavelet families for eighteen different EMG signals. A comparison study is also given to show performance of various families after modifying the results with back propagation Neural Network. This is actually will help the researchers with the first step of EMG analysis. Huge sets of results (more than 100 sets) are proposed and then classified to be discussed and reach the final.

View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (7)
Scopus Crossref