Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 01 2004
Journal Name
Al-academy
تقييم قابلية اداء متطلبات العمل للعاملين في الصناعة باستخدام طريقة القصور الذاتي
...Show More Authors

تقييم قابلية اداء متطلبات العمل للعاملين في الصناعة باستخدام طريقة القصور الذاتي

View Publication Preview PDF
Publication Date
Sun Jul 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Teaching Using Adey- Shire Model and its Effect in Achievement and Critical Thinking for first intermediate students in Mathematics
...Show More Authors

The aim of this research is to measure the effect of Adey- Shire model in the achievement and critical thinking of first intermediate female students in mathematics. The researcher adopted the experimental method with a post-test, the research of sample consists of (60) female students, divided into two groups with (30) students in the experimental group, that studied with Adey- Shire model, and (30) students in the control group who studied in the usual way. The two groups are equivalent in many variables. The researcher makes two tests of multiple choices, the first one is an achievement test consists (30) items and another test was for a critical thinking test with (25) items. The statistical analysis make to both tests is made with s

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Spectrophotometric determination of Procaine penicillin in pure and pharmaceutical formulations using metol
...Show More Authors

A simple, accurate and sensitive spectrophotometric method for the determination of Procaine penicillin (PP) is described. The method is based on charge-transfer reaction of PP with metol (N-methyl-p-hydroxy aniline) in the presence of ferric sulphate to form a purple-water soluble complex ,which is stable and has a maximum absorption at 510 nm .A graph of absorbance versus concentration shows that Beer’s low is obeyed over the concentration range of 3-80 µg /ml of PP (i.e.,3-80 ppm) with a molar absorbativity of 4.945 ×103 L.mol-1.cm-1 ,Sandell sensitivity of 0.1190 µg cm-2 ,a relative error of (-1.57)-2.79 % and a standard deviation of less than 0.59 depending on the concentration of PP.The optimum conditions for full co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Design and Implementation for optical fiber communication system using frequency shift coding
...Show More Authors

In this research, optical communication coding systems are designed and constructed by utilizing Frequency Shift Code (FSC) technique. Calculations of the system quality represented by signal to noise ratio (S/N), Bit Error Rate (BER),and Power budget are done. In FSC system, the data of Nonreturn- to–zero (NRZ ) with bit rate at 190 kb/s was entered into FSC encoder circuit in transmitter unit. This data modulates the laser source HFCT-5205 with wavelength at 1310 nm by Intensity Modulation (IM) method, then this data is transferred through Single Mode (SM) optical fiber. The recovery of the NRZ is achieved using decoder circuit in receiver unit. The calculations of BER and S/N for FSC system a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More
Publication Date
Sat Mar 08 2025
Journal Name
Fusion: Practice And Applications
Fast Numeric Sign Detection Using Adaptive Thresholding and Geometry of Optimized Fingers
...Show More Authors

A strong sign language recognition system can break down the barriers that separate hearing and speaking members of society from speechless members. A novel fast recognition system with low computational cost for digital American Sign Language (ASL) is introduced in this research. Different image processing techniques are used to optimize and extract the shape of the hand fingers in each sign. The feature extraction stage includes a determination of the optimal threshold based on statistical bases and then recognizing the gap area in the zero sign and calculating the heights of each finger in the other digits. The classification stage depends on the gap area in the zero signs and the number of opened fingers in the other signs as well as

... Show More
Scopus
Publication Date
Sat Jul 01 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
An Efficient Cryptosystem for Image Using 1D and 2D Logistic Chaotic Maps
...Show More Authors

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Experimental and Numerical Analysis of Laser Surface Melting by Using Enthalpy Method
...Show More Authors
Abstract<p>In this study, experimental and numerical applied of heat distribution due to pulsed Nd: YAG laser surface melting. Experimental side was consists of laser parameters are, pulse duration1.3<italic>ms</italic>, wavelength 1064nm, laser energies 1.5, 2. 6 and 4.3 J, laser beam diameter is 0.6 mm and spot diameter 0.78 mm was applied a low carbon steel type St37 with a dimension 10, 10, 3 mm, length, width and thickness respectively. Numerical analysis side consist of a mathematical model and calculating a thermal cycle by using equation in the enthalpy method applied to determine the cooling rate in fusion zone. The simulation by using the enthalpy method, applied on conduction heat transfer </p> ... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Achieving the Benefits and Requirements of Integrated Project Delivery Method Using BIM
...Show More Authors
Abstract<p>Through the last decade, Integrated Project Delivery (IPD) methodology considers one of the new contractual relations that are also on the way to further integrate the process of combining design and instruction. On the other hand, Building Information Modeling (BIM) made significant advancements in coordinating the planning and construction processes. It is being used more often in conjunction with traditional delivery methods. In this paper, the researcher will present the achievement of IPD methodology by using BIM through applying on the design of the financial commission building in Mayssan Oil Company in Iraq. The building has not been constructed yet and it was designed by usin</p> ... Show More
View Publication
Scopus (7)
Crossref (9)
Scopus Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
On Light Mapping and Certain Concepts by Using m_X N-Open Sets
...Show More Authors

The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.

View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref