Preferred Language
Articles
/
alkej-766
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 22 2023
Journal Name
Iraqi Journal Of Science
Sero-prevalence of visceral leishmaniasis by using two diagnostic kits (rKE16 and rK39)
...Show More Authors

The dipstick test was evaluated for sero-diagnosis of visceral leishmaniasis. We compared two types of dipstick (rKE16, rK39) tests . The sensitivity of both tests were determined using sera from fifty-two children suspected of having visceral leishmaniasis and thirty healthy children as a control group collected from Central Teaching Hospital of Pediatric in Baghdad. Fifty (96.15%) cases were confirmed to have infection by rKE16 dipstick test while, fourty-six (88.46%) cases were positive by rK39 dipstick test. Non of the sample taken from healthy control showed reactivity in any of these tests. The study indicated that rKE16 test had better sensitivity than rK39 in the diagnosis of VL(100%) ,(92 %) respectively.

View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
Green synthesis of gold NPs by using dragon fruit: Toxicity and wound healing
...Show More Authors
Abstract<p>In this work, the study of <italic>Hylocereus undatus</italic> properties was done by studying quantitative phytochemical compounds and seeking for total phenolic compounds, synthesis of gold nanoparticles was created via reduction of aqueous gold ions with the aqueous fruit extract of The <italic>Hylocereus undatus</italic> (dragon). The synthesized AuNPs were asserted by using (Uv-Vis) spectrophotometer; Fourier transforms infrared (FI-IR) spectroscopy, Atomic force microscope (AFM), Scanning Electron Microscopy (SEM) Zitasizer. The absorbance for SPR is noticed in 546 nm by using Uv-Visible spectroscopy The SEM and AFM analysis evidenced the particle size betwee</p> ... Show More
View Publication
Scopus (15)
Crossref (13)
Scopus Crossref
Publication Date
Wed Apr 12 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
the Optical Properties of Electrostatic Design and Study Mirror By using Bimurzaev Technique
...Show More Authors

In this research a computational simulation  has been carried out on the design and properties of the electrostatic mirror and a mathematical expression has been suggested  to represent the axial potential of an electrostatic mirror. The electron beam path using the Bimurzaev  technique had been investigated as mirror trajectory with the aid of Runge – Kutta  method. The spherical and chromatic aberration coefficients of mirror has computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements. The Electrode shape of mirror two electrodes has been determined by using package SIMION computer program. Computations have shown that the suggested potentials giv

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 21 2020
Journal Name
Baghdad Science Journal
Synthesis of Gold Nanoparticles by using Batch Method and Study its Antibacterial Activity
...Show More Authors

The research involves preparing gold nanoparticles (AuNPs) and studying the factors that influence the shape, sizes and distribution ratio of the prepared particles according to Turkevich method. These factors include (reaction temperature, initial heating, concentration of gold ions, concentration and quantity of added citrate, reaction time and order of reactant addition). Gold nanoparticles prepared were characterized by the following measurements: UV-Visible spectroscopy, X-ray diffraction and scanning electron microscopy. The average size of gold nanoparticles was formed in the range (20 -35) nm. The amount of added citrate was changed and studied. In addition, the concentration of added gold ions was changed and the calibration cur

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Mar 31 2020
Journal Name
International Journal Of Heat And Technology
Enhancement of Natural Convection Heat Transfer of Hybrid Design Heat Sink
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon May 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Role of Omeprazole in Enhancement of Antibiotic Resistance in E. coli
...Show More Authors

E. coli was isolated, and it was Gram-negative rod bacteria that was colony circular, regular edged, thick somewhat glitter and  viscous(less). It was lactose fermenter bacteria and belongs the family of Enterobacteriaceae. E. coli showed sensitivity to all used antibiotics except Erythromycin (E), Cloxacellin (CX), Rifampin (RA), Cephalothin (KF), Ampicillin (AM), and Penicillin (P). The experimental results of antibiotic sensitivity of E. coli in media containing different concentrations of omeprazole, a proton pump inhibitor, showed an enhancement of resistance by decreasing the sensitivity of E. coli inversely with drug concentration against the antibiotics that E. coli was sensitive to. It seems that omeprazole changed cell mem

... Show More
View Publication Preview PDF
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
2016 38th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Selecting the optimal movement subset with different pattern recognition based EMG control algorithms
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Engineering
Determining and Predicting the Water Demand Dynamic System Model Mapping Urban Crawling and Monitoring Using Remote Sensing Techniques and GIS
...Show More Authors

Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Engineering
Determining and Predicting the Water Demand Dynamic System Model Mapping Urban Crawling and Monitoring Using Remote Sensing Techniques and GIS
...Show More Authors

The problem of rapid population growth is one of the main problems effecting countries of the world the reason for this the growth in different environment areas of life commercial, industrial, social, food and educational. Therefore, this study was conducted on the amount of potable water consumed using two models of the two satellite and aerial images of the Kadhimiya District-block 427 and Al-Shu,laa district-block 450 in Baghdad city for available years in the Secretariat of Baghdad (2005, 2011,2013,2015). Through the characteristics of geographic information systems, which revealed the spatial patterns of urban creep by determining the role and buildings to be created, which appear in the picture for the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref