Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 21 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
New techniques to estimate the solution of autonomous system
...Show More Authors

This research aims to solve the nonlinear model formulated in a system of differential equations with an initial value problem (IVP) represented in COVID-19 mathematical epidemiology model as an application using new approach: Approximate Shrunken are proposed to solve such model under investigation, which combines classic numerical method and numerical simulation techniques in an effective statistical form which is shrunken estimation formula. Two numerical simulation methods are used firstly to solve this model: Mean Monte Carlo Runge-Kutta and Mean Latin Hypercube Runge-Kutta Methods. Then two approximate simulation methods are proposed to solve the current study. The results of the proposed approximate shrunken methods and the numerical

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Dec 16 2024
Journal Name
International Journal Of Computing And Digital Systems
Digital Intelligence for University Students Using Artificial Intelligence Techniques
...Show More Authors

The research problem arose from the researchers’ sense of the importance of Digital Intelligence (DI), as it is a basic requirement to help students engage in the digital world and be disciplined in using technology and digital techniques, as students’ ideas are sufficiently susceptible to influence at this stage in light of modern technology. The research aims to determine the level of DI among university students using Artificial Intelligence (AI) techniques. To verify this, the researchers built a measure of DI. The measure in its final form consisted of (24) items distributed among (8) main skills, and the validity and reliability of the tool were confirmed. It was applied to a sample of 139 male and female students who were chosen

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Error Investigation for Free Form Surfaces in Bezier Techniques
...Show More Authors

Surface modeling utilizing Bezier technique is one of the more important tool in computer aided geometric design (CAD). The aim of this work is to design and implement multi-patches Bezier free-form surface. The technique has an effective contribution in technology domains and in ships, aircrafts, and cars industry, moreover for its wide utilization in making the molds. This work is includes the synthesis of these patches in a method that is allow the participation of these control point for the merge of the patches, and the confluence of patches at similar degree sides due to degree variation per patch.  The model has been implemented to represent the surface. The interior data of the desired surfaces designed by M

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
International Journal Of Computing And Digital Systems
Digital Intelligence for University Students Using Artificial Intelligence Techniques
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Sep 30 2024
Journal Name
Iraqi Journal Of Science
Attention-Deficit Hyperactivity Disorder Prediction by Artificial Intelligence Techniques
...Show More Authors

Attention-Deficit Hyperactivity Disorder (ADHD), a neurodevelopmental disorder affecting millions of people globally, is defined by symptoms of hyperactivity, impulsivity, and inattention that can significantly affect an individual's daily life. The diagnostic process for ADHD is complex, requiring a combination of clinical assessments and subjective evaluations. However, recent advances in artificial intelligence (AI) techniques have shown promise in predicting ADHD and providing an early diagnosis. In this study, we will explore the application of two AI techniques, K-Nearest Neighbors (KNN) and Adaptive Boosting (AdaBoost), in predicting ADHD using the Python programming language. The classification accuracies obtained w

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jan 01 2003
Journal Name
Ipmj-iraqi Postgraduate Medical Journal
Changes in acid phosphatase activity in rat’s mammary tissue from virginity, through pregnancy, lactation and post–lactation
...Show More Authors

Purpose: Studying the activity of acid phosphatase, which is the marker of lysosomal activity in the mammary glands of rats at different stages of the physiological maturation [virgih, pregnancy, lactation and Post lactation] Methods: Forty, female, albino rats were used in this study. They were divided into four groups according to their physiological states [virgin, pregnancy, lactation and post lactation]. The mammary glands, after suitable fixation and sectioning, were employed for routine haematoxylin and eosin stain and for acid phosphatase demonstration Results: Acid phosphatase activity was weakly diffuse in the secretory tubules of virgin rats, the diffuse and granular activity of this enzyme was increased during pregnancy in the s

... Show More
Publication Date
Sun Jul 06 2025
Journal Name
Jordan Medical Journal
Enhancing Adherence and Satisfaction with Disease-Modifying Therapies in Multiple Sclerosis Through Pharmacist-Led Interventions: Interventional Study
...Show More Authors

Background: Pharmacists are essential in treating MS. Pharmacists' involvement and patient consultation may improve patient adherence and satisfaction. Aim: To evaluate the influence of pharmacist-led interventions (PLI) on medication adherence and satisfaction in patients with multiple sclerosis receiving disease-modifying therapies (DMTs). Methods: This study was conducted on patients with relapsing-remitting multiple sclerosis who were receiving DMTs and attended a neurological consultant clinic in the medical city of Baghdad. It was a pre-post-intervention study. Each patient underwent two educational sessions: the first session took place at the beginning of the study, after completing the Arabic version of the treatment satisfaction q

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Research In Social Sciences & Humanities
The House of Bernarda Alba: The Image of Repression and Female Rebellion Through the Character of Adela
...Show More Authors

In the present work, the image and representation of Adela, the youngest daughter of the family of the Casa de Bernarda Alba, one of the most popular works of the Spanish author Federico García Lorca (1898-1936), will be analyzed. In this work, there are different themes, but what concerns us is to show the repression, oppression and rebellion of this character in a context of customs of the 1920s in Spain. They are revealing elements in that period in which women were relegated to the background, despite the fact that a feminist movement had already begun in Spain. By studying Adela, we seek to see how a single woman confronts her family and the society that surrounds her to fight for freedom, although its end is finally linked to

... Show More
View Publication
Crossref
Publication Date
Thu Jun 23 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Flow Injection Spectrophotometric Technique for Determining of Genistein in Pure and Supplements Formulations Through Diazotization Coupling Reaction
...Show More Authors

Genistein (GEN) is The major isoflavone found in soybeans, has a number of cardiovascular health benefits, Postmenopausal syndrome and osteoporosis. A direct flow injection analysis method for estimation of (GEN) in pure and supplements formulation . This system is based on diazotization coupling reactions between procaine penciline (PR) and genistein in basic medium, they formed yellow dyes have maximum absorption at 416 nm. Calibration curve were constructed over different GEN concentrations, linearity for GEN was 10-100 µg.mL-1 and detection limits of 1.51 ?g/mL. In the FIA technique, all analytical factors were analyzed and optimized. The established method was successfully used to determine GEN in the formulations of its supplement

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref