Preferred Language
Articles
/
wxghOZgBVTCNdQwC_LqA
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the Lyapunov exponents, fractal dimension, and bifurcation diagrams. Furthermore, an algorithm is suggested to generate a random binary key, serving as the controller for the embedding process. And the randomness of the generated key was checked. Moreover, this paper introduces a technique that utilizes the generated random key to govern both the embedding process in the spatial domain and the frequency domain. The results of this study are promising and its potential applications can be extended to various fields that require discreet communication and robust data protection

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Modeling and Analyzing the Influence of Fear on the Harvested Modified Leslie-Gower Model
...Show More Authors

A modified Leslie-Gower predator-prey model with a Beddington-DeAngelis functional response is proposed and studied. The purpose is to examine the effects of fear and quadratic fixed effort harvesting on the system's dynamic behavior. The model's qualitative properties, such as local equilibria stability, permanence, and global stability, are examined. The analysis of local bifurcation has been studied. It is discovered that the system experiences a saddle-node bifurcation at the survival equilibrium point whereas a transcritical bifurcation occurs at the boundary equilibrium point. Additionally established are the prerequisites for Hopf bifurcation existence. Finally, using MATLAB, a numerical investigation is conducted to verify the va

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (1)
Scopus Crossref
Publication Date
Sat Mar 16 2019
Journal Name
Route Educational & Social Science Journal
Information awareness of students from Ibn Al-Haytham Education College of pure sciesnces and its influence on their analytical thinking skill
...Show More Authors

this research is to identify the level of information awareness of the chemistry students in their fourth year studying at Ibn Al-Haytham Education College of pure sciences at the University of Baghdad. The research sample consisted of (107) male and female students out of the total number of (153) students studying during the (2017-2018) academic year, The sample therefore represents 71% of the total students. The research methodology used consisted of two parts. The first part is concerned with measuring information awareness using a multiple choice type of test related to (40) issues. The students were required to select the between (5) alternative answers for each issue. The objectives of the test and the issues used are to measure the

... Show More
Publication Date
Thu Feb 06 2020
Journal Name
Political Sciences Journal
The effect of the media in forming knowledge and political awareness
...Show More Authors

Abstract The dissemination of knowledge is no longer confined to schools and universities, not even books. For nearly two centuries, the media have become prominent in disseminating knowledge and culture, in its public and particularly political aspects. After the development of the media from newspapers and magazines to the visual media, their role has increased from the dissemination of abstract information and abstract knowledge towards the process of forming new knowledge through what it publishes and broadcasts from different programs such as drama, news and talk shows. The impact of the media has changed the overall community awareness. Half a century ago the media was not so powerful and widespread. The evolution of the 1990s made

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Acta Facultatis Medicae Naissensis
Helicobacter pylori in obese females
...Show More Authors

Obesity is an increasing health problem in developing countries and has grown into a major global epidemic. Recent studies suggest that colonization of the stomach with Helicobacter pylori (H. pylori) may affect gastric expression of appetite and satiety-related hormones, finding that patients cured of H. pylori infection have gained weight. Further exploration of the relationship between obesity and H. pylori infection is therefore warranted. The objective of this study was to determine the prevalence of H. pylori infection in a sample of obese patients. A total of 69 obese females and 55 normal-weight females as a control group were included. Body mass indices (BMI) of all females were measured and tests for H. pylori performed. Subjects

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Journal Of Engineering
Rutting Prediction of Asphalt Mixtures Containing Treated and Untreated Recycled Concrete Aggregate
...Show More Authors

Rutting is a crucial element of the mechanical performance characteristics of asphalt mixtures, which was the primary target of this study. The task involved substituting various portions of virgin coarse aggregate with recycled concrete aggregate materials that had been treated or left untreated at rates ranging from 25 to 100%, with a constant increase of 25%. The treatment process of recycled concrete aggregate involved soaking in acetic acid, followed by a mechanical process for a short time inside a Los Angeles machine without the balls. This research utilized two primary tests: the standard Marshall test to identify the optimal asphalt contents and the volumetric characteristics of asphalt mixtures. The other one w

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Experimental Studies and Finite Element Modeling of Piles and Pile Groups in Dry Sand under Harmonic Excitation
...Show More Authors

Foundations supporting reciprocating engines, radar towers, turbines, large electric motors, and generators, etc. are subject to vibrations caused by unbalanced machine forces as well as the static weight of the machine. If these vibrations are excessive, they may damage the machine or cause it not to function properly. In the case of block foundation, if changes in size and mass of the foundation do not lead to a satisfactory design, a pile foundation may be used. In this study, the dynamic response of piles and pile Groups in dry sand is investigated experimentally. The analysis involves the displacement response under harmonic excitation. In addition, a numerical modeling by using finite element method with a three-dimensional formula

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
The impact of Jurisprudence Rules in Addressing Contemporary security Challenges
...Show More Authors

The impact of Jurisprudence Rules in Addressing Contemporary security Challenges

Islamic jurisprudence is related to various fields of knowledge, as it is a science of great value, great in impact, and among the most prominent features of jurisprudence comes the jurisprudence rules. It regulates the principles of the doctrine for the jurist. Therefore, the main this research focuses on (the impact of jurisprudence rules in addressing contemporary security challenges). It is the relationship between jurisprudence rules and achieving security. Its fruit would be a statement of the distinguished impact of jurisprudence rules on the stability of the country, and its leading role in maintaining, strengthening, and pre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 03 2022
Journal Name
Teikyo Medical Journal
Tooth agenesis and palatal dimensions associated with craniofacial deformity- Cone Beam Computed Tomography based study
...Show More Authors

Cleft / palate is one of the common congenital deformities in craniofacial region, associated with different types of dental anomalies like (Tooth agenesis, impaction, and supernumerary teeth) with marked changes in palatal dimensions. This study aimed to determine the prevalence of teeth agenesis and dental anomalies in cleft lip/palate patients using CBCT, and to compare the palatal dimension of cleft group with control subjects. Twenty-eight cleft cases collected during the period from 2015 to 2022, CBCT images evaluated, the study sample classified into two groups (14 bilateral and 14 unilateral cleft lip/palate) and the non-cleft control group (14 CBCT images). The presence of dental anomalies was assessed in relation to clef

... Show More