Preferred Language
Articles
/
alkej-766
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Aug 06 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Approximation Solutions for System of Linear Fredhom Integral Equations by Using Decomposition Method
...Show More Authors

In this paper, the Decomposition method was used to find approximation solutions for a system of linear Fredholm integral equations of the second kind. In this method the solution of a functional equations is considered as the sum of an infinite series usually converging to the solution, and Adomian decomposition method for solving linear and nonlinear integral equations. Finally, numerical examples are prepared to illustrate these considerations.

View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Predicting Social Security Fund compensation in Iraq using ARMAX Model
...Show More Authors

Time series have gained great importance and have been applied in a manner in the economic, financial, health and social fields and used in the analysis through studying the changes and forecasting the future of the phenomenon. One of the most important models of the black box is the "ARMAX" model, which is a mixed model consisting of self-regression with moving averages with external inputs. It consists of several stages, namely determining the rank of the model and the process of estimating the parameters of the model and then the prediction process to know the amount of compensation granted to workers in the future in order to fulfil the future obligations of the Fund. , And using the regular least squares method and the frequ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Applied Energy
Solidification enhancement with multiple PCMs, cascaded metal foam and nanoparticles in the shell-and-tube energy storage system
...Show More Authors

View Publication
Scopus (241)
Crossref (235)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Improving Security of the Crypto-Stego Approach using Time Sequence Dictionary and Spacing Modification Techniques
...Show More Authors

Cryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Thermal Conductivity Enhancement of Iraqi Origin Paraffin Wax by Nano-Alumina
...Show More Authors

Abstract

 

Paraffin wax is utilized for the heat storage applications taking advantage from the high stored latent heat during the phase change (from solid to fluid) period. What isn't right with this procedure is that the wax has a little heat transfer rate because of its low thermal conductivity. The thermal conductivity improvement of the paraffin wax has been examined utilizing nano-material with high thermal conductivity. In the recent study, (Al2O3) nanoparticles with weights of 1, 2, and 3% of the paraffin wax were added to the paraffin wax. The Iraqi paraffin wax accessible at the local markets was utilized as a phase change material (PCM).

Many properties of the

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Fri Nov 10 2023
Journal Name
Chalcogenide Letters
Enhancement efficiency of cadmium selenium solar cell by doping within silver
...Show More Authors

We studied at the morphology, structural setup, and optical characteristics of thin cadmium (CdSe) films a thickness of 250 nm that were created by thermal evaporation over glass, The films exhibited a hexagonal shape were crystalline, and tended to form grains in the (111) crystallographic direction, according to the X-ray diffraction examinations. These characteristics were established using the investigation's findings. Through the use of thin films of CdSe doped with Ag at a concentration of 1.5%, the crystal structure orientations for pure CdSe (25.32, 41.84) and CdSe:Ag (25.39, 41.01) that were both pure as well as those that were doped with silver were both determined. The band gap of the optical spectrum decreased by 1.93–

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Civil And Environmental Engineering
Prediction of the Delay in the Portfolio Construction Using Naïve Bayesian Classification Algorithms
...Show More Authors
Abstract<p>Projects suspensions are between the most insistent tasks confronted by the construction field accredited to the sector’s difficulty and its essential delay risk foundations’ interdependence. Machine learning provides a perfect group of techniques, which can attack those complex systems. The study aimed to recognize and progress a wellorganized predictive data tool to examine and learn from delay sources depend on preceding data of construction projects by using decision trees and naïve Bayesian classification algorithms. An intensive review of available data has been conducted to explore the real reasons and causes of construction project delays. The results show that the postpo</p> ... Show More
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Apr 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Calculation of the Radionuclide Concentrations in Samples of Condiments by Using Gamma Spectroscopy System
...Show More Authors

 The aim of this work  is to evaluate concentrations of  natural and artificial radionuclide  in nine different samples of condiments from local markets.     The concentrations of 238 U , 232 Th ,40k  and 137Cs  were measured by using gamma spectroscopy with a high- purity germanium detector. The concentrations of 238 U, 232 Th ,40k  and 137Cs   were found to be in a range of  (21.4 - 91.13), (15.7 - 88.11) , (285.56 – 1100) and (5.1 - 27.5) Bq.kg-1  respectively. These concentrations are not hazardous to public health and the activities are within the allowed  levels

View Publication Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
DNA Fragmentation in Male Couples of Females with Recurrent Spontaneous Abortions (RSA)
...Show More Authors

Comet assay Single cell electrophoresis assay (SCGE) is a very sensitive method to determine DNA damage caused by exposure to mutagenic and carcinogenic and environmental agents that effect couples infertility. The aim of project was to evaluate DNA damage in males couples of females with recurrent spontaneous abortions. Forty males couples of females with unexplained recurrent spontaneous abortions and 25 healthy fertile males (control group) were evaluated for semen quality by conventional semen parameters, and alkaline comet assay was applied for the two groups. The results showed that patients male couples of females with RSA had a significant higher DNA damage than in the control group. It was concluded that patients male couples of

... Show More
View Publication Preview PDF