Preferred Language
Articles
/
bsj-2629
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and in practice, through example.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Planner And Development
Spatial analysis of rural services in the district of Fallujah, Zgharit village, as a model
...Show More Authors

          The study of services in villages is one of the imperative matters that must   be focused on, because it leads to increased attention, which reduces the differences between the countryside and the urban. The extent of its.

  It is well known that community services need to be reached by a person, unlike the anchor services that reach people, here the population distribution plays an important and prominent role in signing these services, so the dispersed distribution pattern and the gathering pattern appeared in the distribution, thus an effect on the time and distance that the person walked to obtain The services are community-based. Therefore

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Key Exchange Management by using Neural Network Synchronization
...Show More Authors

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
International Journal Of Basic And Applied Sciences
A reliable iterative method for solving the epidemic model and the prey and predator problems
...Show More Authors

In the present article, we implement the new iterative method proposed by Daftardar-Gejji and Jafari (NIM) [V. Daftardar-Gejji, H. Jafari, An iterative method for solving nonlinear functional equations, J. Math. Anal. Appl. 316 (2006) 753-763] to solve two problems; the first one is the problem of spread of a non-fatal disease in a population which is assumed to have constant size over the period of the epidemic, and the other one is the problem of the prey and predator. The results demonstrate that the method has many merits such as being derivative-free, overcome the difficulty arising in calculating Adomian polynomials to handle the nonlinear terms in Adomian Decomposition Method (ADM), does not require to calculate Lagrange multiplier a

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Tue Jul 30 2024
Journal Name
Iraqi Journal Of Science
A Survey on Image Caption Generation in Various Languages
...Show More Authors

      The image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o

... Show More
View Publication
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Sun Mar 08 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of systemic administration of Simvastatin on dental implant stability: A random clinical study
...Show More Authors

Background: the primary objective for many researches carried out in dental implantology was to reduce the period needed for functional implant loading, simvastatin (cholesterol lowering medication) had many pleiotropic effects, one of which was increasing bone density around titanium implants (1) and subsequently establishing faster osseointegrated dental implants (2,3). This study aims to reduce the period of time needed to establish secondary stability of dental implant measured in ISQ (Implant Stability Quotient) by investigating the effect of orally administered simvastatin on bone. Materials and methods: simvastatin tablets (40mg/day for three months) were administered orally for 11 healthy women aged (40-51) years old who received 1

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
Nation-Building in The Fragile States: Iraq After 2003 as a Model
...Show More Authors

The nation-building process in fragile states is complex, often involving multifaceted challenges and opportunities. A pertinent example is Iraq post-2003, which serves as a model to study the intricacies of rebuilding a nation in the aftermath of conflict. During this period, we witnessed a significant international intervention aimed at establishing democratic governance, fostering economic development, and restoring social stability. Iraq’s nation-building journey showcases both successes and shortcomings. Establishing a representative government marked a step towards inclusivity and political participation, yet sectarian tensions persisted, hindering cohesive national identity. Economic initiatives aimed to harness Iraq's oil resou

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Building a strategic perspective on the system of governance and measuring the level of its performance Survey study at the University of Basra
...Show More Authors

The Local and Global Corporations are suffering of managerial and financial corruption phenomena, which leads them to loss and bankruptcy. So, it is necessary to search for tools which help prevent phenomena like this, and one of these tools is (corporate governance) which represent controlling tool that contribute in reducing corruption. this study aims at modifying (corporate governance system)in order to make it suitable with Iraqi government Corporations. the study depend upon main hypothesis which is (the performance level of the strategic perspective of governance system is depending upon work according to the perspective dimensions itself.  From the main conclusions:-It is possible to building a strategic perspective

... Show More
View Publication Preview PDF
Crossref