Preferred Language
Articles
/
URb_kYwBVTCNdQwCl_2O
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cycle to increases the complexity of the algorithm detection. An additional shared key between the sender and the receiver is added which is applied before starting the encryption process, that key must be hex-decimal in order to increase the level of security and give enough time to delay the guessing of the secret text by the attackers.  The secret message data is concealed using one of the two techniques: either least significant bit (3-LSB) steganography or hiding in green and blue bits. To expedite the concealment process, the cover image is enhanced by applying a median filter, the median filter removes noise from the image while preserving its details. Finally, comparing the results of the two methods to determine which is better for the cover image in terms of PSNR metrics and hiding process time.

Crossref
View Publication
Publication Date
Sat Nov 01 2025
Journal Name
Journal Of Studies And Researches Of Sport Education
The reality of women's sports in Basra Governorate
...Show More Authors

In our current era, women need to practice sports activities in order to compensate for the lack of movement. The development of life and the introduction of technology in all fields contributed to reducing body movements to the maximum. Many movements were also shortened, and some parts of the body became almost static. All machines became available in homes. Necessary to help women clean and cook. The presence of transportation also restricted women, so the walking sport that women used to practice when they went shopping in nearby places or to visit friends disappeared. As a result, many health problems emerged, prompting some developed countries to allocate financial aid with the help of insurance companies to these patients.The researc

... Show More
View Publication
Publication Date
Sat Nov 01 2025
Journal Name
Journal Of College Of Law For Legal And Political Sciences
Management's responsibility for breach of investment administrative contracts
...Show More Authors

View Publication
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Economic Analysis for Construction in Ibn Khalduon s’ Muqaddimah
...Show More Authors

The specialist researcher  fined the relations between economic ideas with economic facts in his theory which called humanity building it is appeared clearly ( in Ibn Khalduons’ Muqaddimah) in a clothe of economic  social  phenomenon's as a systematical analysis in all fifty chapters of al Muqaddimah ,therefore this paper deal with  Ibn Khalduon economic thoughts as important says which describe the society building in its economic subjective  and  examine the relationship between The dissert and the city within economic says which are cover  the social analysis ,and determinate   the analysis objects  which clearly in this dualism  model ,between the state and economic bas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 18 2019
Journal Name
Baghdad Science Journal
Enhancement of hydrothermally Co <sub>3</sub> O <sub>4</sub> thin films as H <sub>2</sub> S gas sensor by loading yttrium element
...Show More Authors

The gas sensing properties of Co3O4and Co3O4:Y nano structures were investigated. The films were synthesized using the hydrothermal method on a seeded layer. The XRD, SEM analysis and gas sensing properties were investigated for Co3O4and Co3O4:Y thin films. XRD analysis shows that all films are polycrystalline in nature, having a cubic structure, and the crystallite size is (11.7)nm for cobalt oxide and (9.3)nm for the Co3O4:10%Y. The SEM analysis of thin films obviously indicates that Co3O4possesses a nanosphere-like structure and a flower-like structure for Co3O4:Y.The sensitivity, response time and recovery time to a H2S reducing gas were tested at different operating

... Show More
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The concept of suspense and mystery with some references to dickens s Novels ; A tale of two cities and Great expectations
...Show More Authors

0

View Publication Preview PDF
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Genetic Algorithm Based PID Controller Design for a Precise Tracking of Two-Axis Piezoelectric Micropositioning Stage
...Show More Authors

 In this paper, an intelligent tracking control system of both single- and double-axis Piezoelectric Micropositioner stage is designed using Genetic Algorithms (GAs) method for the optimal Proportional-Integral-Derivative (PID) controller tuning parameters. The (GA)-based PID control design approach is a methodology to tune a (PID) controller in an optimal control sense with respect to specified objective function. By using the (GA)-based PID control approach, the high-performance trajectory tracking responses of the Piezoelectric Micropositioner stage can be obtained. The (GA) code was built and the simulation results were obtained using MATLAB environment. The Piezoelectric Micropositioner simulation model with th

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (15)
Scopus Crossref
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
A Cognitive Hybrid Tuning Control Algorithm Design for Nonlinear Path-Tracking Controller for Wheeled Mobile Robot
...Show More Authors

Abstract

This research presents a on-line cognitive tuning control algorithm for the nonlinear controller of path-tracking for dynamic wheeled mobile robot to stabilize and follow a continuous reference path with minimum tracking pose error. The goal of the proposed structure of a hybrid (Bees-PSO) algorithm is to find and tune the values of the control gains of the nonlinear (neural and back-stepping method) controllers as a simple on-line with fast tuning techniques in order to obtain the best torques actions of the wheels for the cart mobile robot from the proposed two controllers. Simulation results (Matlab Package 2012a) show that the nonlinear neural controller with hybrid Bees-PSO cognitive algorithm is m

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Al-khwarizmi Engineering Journal
A Proposed Artificial Intelligence Algorithm for Assessing of Risk Priority for Medical Equipment in Iraqi Hospital
...Show More Authors

This paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Aip Conference Proceedings
Common fixed points and S-best coapproximation in 2-Banach spaces
...Show More Authors

View Publication
Scopus Clarivate Crossref