Preferred Language
Articles
/
fRbmvYoBVTCNdQwCDaS4
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used to encode messages (characters, numbers, and special characters) to binary numbers. Three encoding ideas are proposed for this reason. At the same time, the second step is used Arabic language words to represent the obtained binary sequences to achieve the final secret text. The obtained results exhibited that sending a text containing secret messages in a different language (Arabic) cannot be suspicious when read.

Publication Date
Mon Nov 26 2018
Journal Name
Al-khwarizmi Engineering Journal
Study the Effect of Different Percentages of Natural (Orange Peels and Date Seeds) and Industrial Materials (Carbon and Silica) on the Mechanical and Thermal Properties of Polymeric Reinforced Composites
...Show More Authors

Mechanical and thermal properties of composites, consisted of unsaturated polyester resin, reinforced by different kinds of natural materials (Orange peels and Date seeds) and industrial materials (carbon and silica) with particle size 98 µm were studied. Various weight ratios, 5, 10, and 15 wt. % of natural and industrial materials have been infused into polyester. Tensile, three-point bending and thermal conductivity tests were conducted for the unfilled polyester, natural and industrial composite to identify the weight ratio effect on the properties of materials. The results indicated that when the weight ratio for polyester with date seeds increased from 10% to 15%, the maximum Young’s modulus decreased by 54%. When the weight rat

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jun 23 2023
Journal Name
Cumhuriyet Dental Journal
The effectiveness of continuous versus sequential chelation in the removal of smear layer and their influence on push-out bond strength of Bio-C sealer (An in vitro study)
...Show More Authors

Objectives: Successful endodontic treatment outcome requires effective shaping and cleaning of root canals. This study aims to evaluate the smear layer removal after continuous chelation (CC) ) NaOCL\HEDP( and sequential chelation (SC) )NaOCL\EDTA( and their influence on the push-out bond strength (POBS) of Bio-C sealer. Materials and Methods: Palatal roots of the maxillary first molar (n=72) were divided into four groups (n=18) as follows: 3% NaOCL, SC: 3% NaOCL followed by 17% EDTA, CC: 3% NaOCL \9% HEDP and Distilled water. Thirty-two roots (n=8/group) were split longitudinally for smear layer evaluation using SEM. Forty roots were obturated with Guttapercha and Bio-C sealer using a single cone technique. Thre

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Fri Sep 20 2024
Journal Name
Journal Of Nano Research
Impact of Copper Doping on Nanocrystalline SnO<sub>2</sub> Thin Films Synthesized by Sol-Gel Coating and Chemical Bath Deposition for Gas Sensor Applications
...Show More Authors

This work focuses on the preparation of pure nanocrystalline SnO2 and SnO2:Cu thin films on cleaned glass substrates utilizing a sol-gel spin coating and chemical bath deposition (CBD) procedures. The primary aim of this study is to investigate the possible use of these thin films in the context of gas sensor applications. The films underwent annealing in an air environment at a temperature of 500 C for duration of 60 minutes. The thickness of the film that was deposited may be estimated to be around 300 nm. The investigation included an examination of the structural, optical, electrical, and sensing characteristics, which were explored across various preparation circumstances, specifically focusing on varied

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Audit of accounting disclosure for potential liabilities and contingent obligations In light of the Corona pandemic and its reflection on the auditor's opinion: Applied research in the National Insurance Company
...Show More Authors

Abstract:

                The research aims to identify how to audit potential liabilities and contingent liabilities in light of the pandemic and its reflection on the auditor's report. The research problem is represented by the complexity of the process of checking potential liabilities and contingent liabilities in insurance companies, which was negatively reflected in the auditor's neutral technical opinion. The researchers hypothesize that auditing potential liabilities and contingent liabilities in light of the Corona pandemic is positively reflected in the auditor's report. The research concludes that the process of checking potential liabilities and contingent liabilities is

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 28 2025
Journal Name
Retos
The effect of the beehive strategy on deliberate thinking and learning the setting skill of volleyball among female students at the College of Physical Education and Sports Sciences for Woman
...Show More Authors

Objective: Develop a deliberate thinking scale for the setting skill in volleyball for second-year female students in the College of Physical Education and Sports Sciences for Woman. Research methodology: The researchers used the experimental approach, employing a two-group approach (pre-test and post-test), to suit the nature of the research. The research community comprised (65) second-year female students from the College of Physical Education and Sports Sciences for Woman at the University of Baghdad for the academic year 2024-2025. The research sample was randomly selected, with (15) students in Section A, the experimental group, and (15) students in Section B, the control group. This group represented (46%) of the students. Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
International Journal Of Pharmaceutical Research
Effectiveness of Self-Instructional Strategy and the Traditional Teaching Approach on Nursing Students' Knowledge toward Cardiopulmonary Resuscitation at the College of Nursing in University of Baghdad: Randomized Comparative Trial
...Show More Authors

MM ABDUL-WAHHAB, SA AHMED, International Journal of Pharmaceutical Research, 2020 - Cited by 2

View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The contribution of the tax authorities to increase the tax revenues: An applied research on a sample of the supporting bodies in the health sector for the period 1998-2008
...Show More Authors

the research was exposed to a study the importance of the role of the supportive entities in providing the useful information to the tax administration and their ability to extend the level of the tax base of taxpayers, through the improvement of the tax payers determination and their tax settle for the purpose of increasing the tax revenue, and shed light on the legal evidence through which these entities become officially assigned to perform a supplementary task to the General Committee for Taxes GCT, to help it to perform its task efficiently, and to study the reasons of the weak cooperation of the supportive entities and their reluctance to provide useful information which leads to limiting the tax base.

The research data hav

... Show More
View Publication
Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The impact of empowerment strategies on the characteristics of work enrichment An exploratory research to the views of a sample of the leaders of the Ministry of Oil in Iraq
...Show More Authors

The study aimed to investigate the relationship between empowerment strategies and their impact on the success of enrichment work, it included the dimensions of empowerment strategies (power, knowledge, information, rewards), The dimensions of Job enrichment are (Skill variety, Task identity, Task significance, Autonomy, Feedback). The study was conducted at the headquarters of the Iraqi Oil Ministry in Baghdad and was based on a sample of the leadership of the ministry of managers consisting of 215 people. The data were collected using the questionnaire method based on scientific standards adopted in previous st

... Show More
View Publication Preview PDF
Crossref