Preferred Language
Articles
/
JxbtIIgBVTCNdQwCaXTN
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Role of E-Learning in enhancing Total Quality Management in Educational Institutions: an exploratory study of the opinions of a sample of the staff of the Directorate of Education in the province of Nineveh
...Show More Authors

Purpose: The research aims to determine the relationship between E-Learning and Total Quality Management (TQM) in Educational institutions in Nineveh Governorates.

Methodology / Design: The researchers distributed (30) questionnaires to employees (teachers and administrators) of Nineveh Governorate education who represent the community of the research sample, as they were analyzed using the SPSS V.20

The importance of research: The importance of the research in the fact that it focuses on one of the educational methods represented in integrating the traditional method and relying on modern technologies using computers and the Internet in the field of education to improve the reali

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
SiO2 particles effect on the mechanical properties of the starch/PVA blends
...Show More Authors

The present work studies the mechanical properties of SiO2 μPs, and NPs in St/PVA blends. The samples were prepared by casting method as PVA, St/PVA blends at different concentrations (30, 40, 50, and 60 %). DSC and TGA tests were carried out to the samples evolved. The result showed a single glass transition temperature (Tg) for all St /PVA blends that was attributed to the good miscibility of the blends involved. It was found that (Tg) decrease with starch ratio increase. It was seen that (PVA) of (Tg=105 oC); The glass transition temperature which was decrease with starch ratio that was attributed to glass transition relaxation process due to micro-Brownian motion of the main chain back bond. The endothermic peak at 200 oC was attrib

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Journal Of Collage Of Education
FILTER BASES AND ω-PERFECT FUNCTIONS
...Show More Authors

In this paper introduce some generalizations of some definitions which are, closure converge to a point, closure directed toward a set, almost ω-converges to a set, almost condensation point, a set ωH-closed relative, ω-continuous functions, weakly ω-continuous functions, ω-compact functions, ω-rigid a set, almost ω-closed functions and ω-perfect functions with several results concerning them.

Preview PDF
Publication Date
Wed Feb 02 2022
Journal Name
Journal Of Physics: Conference Series
Studying the parameters effect of the sputtering yield for polypropylene bombarding by ions of atmospheric background gases
...Show More Authors

Preview PDF
Publication Date
Mon May 01 2023
Journal Name
Materials Today: Proceedings
An experimental study of the effects of matrix acidising on the petrophysical characteristics of carbonate formation
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Auditor's Evaluation of The Detected Misstatements and Their Reflection on The Administration's Actions is: an Applied Research in the General Company for Grain Processing
...Show More Authors

Some auditors may think that the audit process ends with discovering misstatements and informing management about them, while the discovery of misstatements may be classified by some as the first step in the phase of separating these distortions, as the auditor should collect these misstatements, evaluate them and detail them into misstatements involving errors or misstatements involving fraud Then evaluating it to material or immaterial according to what was stated in the international auditing standards and directing management to amend the essential ones.  The importance of this research lies in identifying the concept of distortions and their types, identifying the method of evaluating distortions into substantial and non-essent

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Advances In The Theory Of Nonlinear Analysis And Its Application
The Influence of the Magnetic Domain on The Peristaltic Motion of The Non-Newtonian Fluid in A Curved Tube
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Jan 05 2022
Journal Name
International Journal Of Early Childhood Special Education
The effect of single superset exercises on the maximum strength of the limb muscles in bodybuilding for players (Classic Physique).
...Show More Authors

HR Ghanim, GA Abdulhassan, International Journal of Early Childhood Special Education, 2022

View Publication
Publication Date
Thu Oct 31 2019
Journal Name
Journal Of Theoretical And Applied Information Technology
AN ENHANCED EVOLUTIONARY ALGORITHM WITH LOCAL HEURISTIC APPROACH FOR DETECTING COMMUNITY IN COMPLEX NETWORKS
...Show More Authors

Preview PDF
Scopus (5)
Scopus
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref