Preferred Language
Articles
/
IxbYIIgBVTCNdQwCknRG
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space) position of in the cover text that used to hide the the secrete sender masseges. The experiments results show that the suggested method presents highly secret due to use the multi-level of complexity to avoid the attackers.

Scopus Crossref
View Publication
Publication Date
Wed Sep 01 2021
Journal Name
Computers And Concrete
Improving the seismic performance of reinforced concrete frames using an innovative metallic-shear damper
...Show More Authors

Scopus (11)
Scopus
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Select the optimal project by using two methods of analytic hierarchy and goal programming
...Show More Authors

      The aim of this research is to solve a real problem in the Department of Economy and Investment in the Martyrs establishment, which is the selection of the optimal project through specific criteria by experts in the same department using a combined mathematical model for the two methods of analytic hierarchy process and goal programming, where a mathematical model for goal programming was built that takes into consideration the priorities of the goal criteria by the decision-maker to reach the best solution that meets all the objectives, whose importance was determined by the hierarchical analysis process. The most important result of this research is the selection of the second pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I Article Sidebar
...Show More Authors

n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Advances In Mechanical Engineering
Using a spherical inverted pendulum and statokinesigram for modeling and evaluating quiet standing posture
...Show More Authors

This paper proposes a new approach to model and analyze erect posture, based on a spherical inverted pendulum which is used to mimic the body posture. The pendulum oscillates in two directions, [Formula: see text] and [Formula: see text], from which the mathematical model was derived and two torque components in oscillation directions were introduced. They are estimated using stabilometric data acquired by a foot pressure mapping system. The model was quantitatively investigated using data from 19 participants, who were first were classified into three groups, according to the foot arch-index. Stabilometric data were then collected and fed into the model to estimate the torque’s components. The components were statistically proce

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Azo Coupling Reaction for indirect Spectrophotometric Determination of Furosemide using Resorcinol as a Reagent
...Show More Authors
Abstract<p>A simple and accurate method to determinate furosemide (FUR) based on converting the secondary amine to primary amine with acidic hydrolysis then azotization by nitrous acid and coupled with resorcinol as a coupling agent in aqueous medium at pH 13. The optical characteristic like beers law limit found to be (0.25-2.5) μg.ml<sup>−1</sup>, detection and quantification limits (0.0196) (0.0654) μg.ml<sup>−1</sup>respectivly and Sandel sensitivity was 0.006738 μg.cm<sup>−2</sup>. The least-square method was used to evaluate the regression equation and the correlation coefficient. The resulted azo dye has a maximum absorbance at 430 nm with light oran</p> ... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Test Engineering & Management
Strengthening of non-liner finite element RCMD Beam with Large Square Opening Using CFRP
...Show More Authors

Publication Date
Thu Sep 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Simulation the Radiation Zone of Al-Mussaib Power Plant by using Monte Carlo Method
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Dec 30 2018
Journal Name
Advances In Science, Technology &amp; Innovation
Producing a Three Dimensional Model for the University of Baghdad Campus Using GIS Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Mar 01 2016
Journal Name
Journal Of Engineering
Some Mechanical Properties of Concrete by using Manufactured Blended Cement with Grinded Local Rocks
...Show More Authors

The  use  of  blended  cement  in  concrete  provides economic, energy savings,  and ecological  benefits, and also  provides. Improvement in the properties of materials incorporating blended cements. The  major  aim  of  this  investigation  is  to  develop  blended  cement  technology using  grinded local rocks . The research includes information on constituent materials, manufacturing processes and performance characteristics of blended cements made with replacement (10 and 20) % of grinded local rocks (limestone, quartzite and porcelinite) from cement.

The main conclusion of this study was that all ty

... Show More
View Publication Preview PDF