Preferred Language
Articles
/
URb_kYwBVTCNdQwCl_2O
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cycle to increases the complexity of the algorithm detection. An additional shared key between the sender and the receiver is added which is applied before starting the encryption process, that key must be hex-decimal in order to increase the level of security and give enough time to delay the guessing of the secret text by the attackers.  The secret message data is concealed using one of the two techniques: either least significant bit (3-LSB) steganography or hiding in green and blue bits. To expedite the concealment process, the cover image is enhanced by applying a median filter, the median filter removes noise from the image while preserving its details. Finally, comparing the results of the two methods to determine which is better for the cover image in terms of PSNR metrics and hiding process time.

Crossref
View Publication
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Language formats in contemporary Arabic poetry in Iraq Areading from a functional perspective
...Show More Authors

Numerous academic and critical studies concerned with the language of poetry, with the differences and diversity in these studies and the critical methods. , the study tries to study this modern approach in the language Iraqi and Arabic poetry according to analyzing and following the functional dimension of the language, regardless of its poetic value which should be on them, as each poetic experience has its own language, thestudy came to investigate the variety of poetry samples, poets from different and far generations. - in an attempt to give an image Career dimension of language, the center of intellectual transformations that have affected the experience of Arabic poetry generally, and the level of language to be exact, as a tool f

... Show More
View Publication Preview PDF
Publication Date
Mon May 01 2017
Journal Name
The Journal Of Immunology
Resveratrol improves a murine model of asthma through alterations in the gut microbiome
...Show More Authors
Abstract<p>Asthma is a condition characterized by bronchial spasms, inflammation, and mucous hypersecretion which leads to difficulties in respiration. Asthmatic patients are usually presented with recurrent attacks of coughing, wheezing, and shortness of breath which could be life-threatening. More than three million cases of asthma in the United States are diagnosed annually. Resveratrol, a polyphenolic stilbene, is known to be useful in controlling asthmatic attacks via different molecular mechanisms within the lung epithelium and infiltrating immune cells. However, few studies mentioned the effect of resveratrol on the microbiome in ovalbumin-induced asthma mouse model. In this study, we ind</p> ... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 04 2013
Journal Name
Proceedings Of Nuclei Of Seyfert Galaxies And Qsos - Central Engine &amp; Conditions Of Star Formation — Pos(seyfert 2012)
Are Narrow Line Seyfert 1 galaxies a special class of Active Galactic Nuclei?
...Show More Authors

No. Due to their apparently extreme optical to X-ray properties, Narrow Line Seyfert 1s (NLSy1s) have been considered a special class of active galactic nuclei (AGN). Here, we summarize observational results from different groups to conclude that none of the characteristics that are typically used to define the NLSy1s as a distinct group – from the, nowadays called, Broad Line Seyfert 1s (BLSy1s) – is unique, nor ubiquitous of these particular sources, but shared by the whole Type 1 AGN. Historically, the NLSy1s have been distinguished from the BLSy1s by the narrow width of the broad Hb emission line. The upper limit on the full width at half maximum of this line is 2000kms−1 for NLSy1s, while in BLSy1s it can be of several thousands

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sat Jul 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Polyacrylonitrile Nanofiber Composites as Efficient Removal of Pollutants for Wastewater: A Review Article
...Show More Authors

Polyacrylonitrile nanofiber (PANFS), a well-known polymers, has been extensively employed in the manufacturing of carbon nanofibers (CNFS), which have recently gained substantial attention due to their excellent features, such as spinnability, environmental friendliness, and commercial feasibility. Because of their high carbon yield and versatility in tailoring the final CNFS structure, In addition to the simple formation of ladder structures through nitrile polymerization to yield stable products, CNFS and PAN have been the focus of extensive research as potential production precursors. For instance, the development of biomedical and high-performance composites has now become achievable. PAN homopolymer or PAN-based precursor copolymer can

... Show More
Publication Date
Thu Dec 30 2021
Journal Name
Diyala Agricultural Sciences Journal
A Study of Some Biological Aspects of Pacu Piaractus Brachypomus (G. Cuvier, 1818)
...Show More Authors

The present study attempts to shed light on some biological aspects and characteristics of Piaractus brachypomus, including some biometrics, phenotypic and feeding pattern that characterizes this species. Besides, the study touches upon the body shape and the Otolith. These fish species have recently been seen frozen in the Iraqi local market. The standard length of fish specimens in this study reach 26.55cm it exceeded the specimens of Pacu fish collected from other studies from other countries, As well the specimens weight was 632gm it exceeded other studies mentioned in this manuscript. As the irregularity in the distribution of teeth rows, especially in the lower jaw was clear in our specimens. The average weight of some skull b

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Nov 03 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
A study of Addictive Inpatients at Ibn-Rushd Psychiatric Teaching Hospital in Baghdad
...Show More Authors

Objective :.
1-Find out the prevalence of alcohol and drugs addiction in two different years before and after the last
war i.e. in 2002 and in 200. 2-Study the association between the addiction
and some variables. 3-Identify the prescribed drugs and other substances that
have been abused
Methodology : A retrospective study has been conducted involving the in-patients at addiction unit-IbnRushd
psychiatric hospital in Baghdad by applying the semi-structured form based on ICD-10 criteria
of addiction and dependency with the confirmation of the specialist psychiatrist diagnosis of
dependency. Data concerning each patient admitted in the hospital was gathered to have an idea about
the problem of addiction (drugs an

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Wed Mar 01 2023
Journal Name
Iraqi Journal Of Physics
Bandwidth Improvement of a Cone-Inverted Cylindrical and Cross Hybrids Dielectric Resonator Antennas
...Show More Authors

In this work, two cone-inverted cylindrical and cross-hybrid dielectric resonator antennas are stacked and excited by the coaxial probe method with an operating standard resonant frequency of 5.438 GHz. A drawback of these standard Dielectric Resonator Antennas (DRAs) is their narrow bandwidth. For good antenna performance, a stacked DR geometry and a thick dielectric substrate having a low dielectric constant are desired since this provides large bandwidth, better radiation power, reduces conductor loss and nonappearance of surface waves. Many approaches, such as changing the shape of the dielectric resonator, have been used to enhance bandwidth. Using DRA, having the lowest dielectric constant, increases the bandwidth and the electroma

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Engineering
Removal of Cadmium from Simulated Wastewaters Using a Fixed Bed Bio-electrochemical Reactor
...Show More Authors

In this research, the removal of cadmium (Cd) from simulated wastewater was investigated by using a fixed bed bio-electrochemical reactor. The effects of the main controlling factors on the performance of the removal process such as applied cell voltage, initial Cd concentration, pH of the catholyte, and the mesh number of the cathode were investigated. The results showed that the applied cell voltage had the main impact on the removal efficiency of cadmium where increasing the applied voltage led to higher removal efficiency. Meanwhile increasing the applied voltage was found to be given lower current efficiency and higher energy consumption.  No significant effect of initial Cd concentration on the removal efficiency of cadmium b

... Show More
View Publication
Crossref (8)
Crossref