Preferred Language
Articles
/
JxbtIIgBVTCNdQwCaXTN
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Establishment of method and the development of the teaching methods in the late abbissid period and it s impact on the contemporary leading methods
...Show More Authors

Every researcher must say that the world in continually progress toward the best and that
the Arab and Islamic civilization had produced much of systems and virtuous educational
practices which raised from Islamic heritage. This nation was not isolated from external
world, but it was made a clear active for promote the banner of other nations which entered
under her influence to promote Islamic banner and Muslims. Consequently also Muslims are
affected and influenced, this resulted a clear impact in the civilization and educational
ideology especially in the contemporary teaching methods.

View Publication Preview PDF
Publication Date
Thu Jun 19 2025
Journal Name
Modern Sport
Time out in basketball and it effect on playing for excellent degrees in Iraq
...Show More Authors

The value of time out as a time not count of official time form the game like four periods and extra time also it considered a great interest if used well thru the game , the importance of this problem is not using well the time out and when the coach ask for time out and how to invest this time legally to make good results also there is no observing system as the researcher see gives the reality image that the coach is successful lead the game when he takes time out . The goals of research that knowing on numbers of time out for excellent teams in Iraq (first &second) stages and putting special inventory reverse reality of asking time out (positive &negative) on playing basketball , the hypothesis of research that tell the time out effect

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Diagnostic Approach of Atypical Cells in Effusion Cytology Using Computerized Image Analysis
...Show More Authors

Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
An Improved Cuckoo Search Algorithm for Maximizing the Coverage Range of Wireless Sensor Networks
...Show More Authors

The issue of increasing the range covered by a wireless sensor network with restricted sensors is addressed utilizing improved CS employing the PSO algorithm and opposition-based learning (ICS-PSO-OBL). At first, the iteration is carried out by updating the old solution dimension by dimension to achieve independent updating across the dimensions in the high-dimensional optimization problem. The PSO operator is then incorporated to lessen the preference random walk stage's imbalance between exploration and exploitation ability. Exceptional individuals are selected from the population using OBL to boost the chance of finding the optimal solution based on the fitness value. The ICS-PSO-OBL is used to maximize coverage in WSN by converting r

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Managerial Skills and It`s Role in Strengthening the Competitive Edge of Companies: A Case Study in the General Company for Construction Industries
...Show More Authors

This research tries to reveal how to manage and control the competitive edge for business by building managerial skills in various organizational levels. Our research aims at finding out the nature of various technical, human and in tellectual skills of a new president whose superiority is his competitive ness in the application field at general company for construe tioual  industriesand testing the surveyed minor and major changes through a questionnaire to collect information from officials. The sample was composed of (45) director. The data was analyzed  using some methods and statistical programs. The most prominent of these is (SPSS) that was used to extract the arithmetic mean, standard deviation, correlation coefficient

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 17 2012
Journal Name
Journal Of The College Of Basic Education
Image Retrieval Using DCT/KWT and D4/KWT in Distributed System
...Show More Authors

This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff

... Show More
Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
The Role of the Auditor in Confirming the Integrated Reports - An Exploratory Study on a Sample of External Auditors in Iraq-
...Show More Authors

  The aim of the research is to identify the extent of the ability to ensure the integrated reports by the auditor in verifying the credibility of these reports, and their implications for the benefit of all parties dealing with the economic unit, as well as measuring the impact of the assurance procedures followed by the auditors and their role in confirming these reports.

  The research methodology was designed after studying the previous literature related to the research variables, and then the relationship between these variables was tested, through the use of a questionnaire list. A questionnaire targeting the community of auditors in the local environment, and the results of the study wer

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Is it possible to teach translation in the classroom?
...Show More Authors

0

View Publication Preview PDF
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
Motives for public exposure to specialized sports satellite channels and the gratifications achieved from it: A survey study on the public of the city of Baghdad
...Show More Authors

Motives for public exposure to specialized sports satellite channels and the gratifications achieved about it - Research presented by (Dr. Dr. Laila Ali Jumaa), Imam Al-Kadhim College (peace be upon him) - Department of Information-2021.

       The research aims to know the extent of public exposure to specialized sports satellite channels, and what gratifications are achieved from them, and to reach scientific results that give an accurate description of exposure, motives and gratifications verified by that exposure, and the research objectives are summarized in the following:

  • Revealing the habits and patterns of public exposure to specialized sports satelli

... Show More
View Publication Preview PDF
Crossref