Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Scientific Research Journal Of Engineering And Computer Science
Cryptography Techniques - A Review
...Show More Authors

l

Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Effects of Water Scarcity on Rural Household Economy
...Show More Authors

This study examined the effects of water scarcity on rural household economy in El Fashir Rural Council / North Darfur State- western Sudan. Both quantitative and qualitative methods were used as to get a deeper understanding of the impact of water scarcity on the rural house economy in the study area. 174 households out of 2017 were selected from 45 villages which were distributed in eight village councils forming the study area. Statistical methods were used to manipulate the data of the study. The obtained results revealed that water scarcity negatively affected the rural household economy in the study area in many features. These include the followings: much family efforts and time were directed to fetch for water consequentl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
New Research Trends in Designing E-Government Architecture Based on Blockchain Technology
...Show More Authors

Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated.  This work studies and analyzes some research trends focused on blockchain

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Alexandria Engineering Journal
U-Net for genomic sequencing: A novel approach to DNA sequence classification
...Show More Authors

The precise classification of DNA sequences is pivotal in genomics, holding significant implications for personalized medicine. The stakes are particularly high when classifying key genetic markers such as BRAC, related to breast cancer susceptibility; BRAF, associated with various malignancies; and KRAS, a recognized oncogene. Conventional machine learning techniques often necessitate intricate feature engineering and may not capture the full spectrum of sequence dependencies. To ameliorate these limitations, this study employs an adapted UNet architecture, originally designed for biomedical image segmentation, to classify DNA sequences.The attention mechanism was also tested LONG WITH u-Net architecture to precisely classify DNA sequences

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
The Effect of Dynamic Loading on Stresses Induced in Charnley Hip Prosthesis
...Show More Authors

This study produces an image of theoretical and experimental case of high loading stumbling condition for hip prosthesis. Model had been studied namely Charnley. This model was modeled with finite element method by using ANSYS software, the effect of changing the design parameters (head diameter, neck length, neck ratio, stem length) on Charnley design, for stumbling case as impact load where the load reach to (8.7* body weight) for impact duration of 0.005sec.An experimental rig had been constructed to test the hip model, this rig consist of a wood box with a smooth sliding shaft where a load of 1 pound is dropped from three heights.
The strain produced by this impact is measured by using rosette strain gauge connected to Wheatstone

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Evidence-based Complementary And Alternative Medicine
Gelam Honey Inhibits the Production of Proinflammatory, Mediators NO,<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M1"><mml:mrow><mml:msub><mml:mrow><mml:mtext>PGE</mml:mtext></mml:mrow><mml:mtext>2</mml:mtext></mml:msub></mml:mrow></mml:math>, TNF-<b><i>α</i></b>, and IL-6 in Carrageenan-Induced Acute Paw Edema in Rats
...Show More Authors

Natural honey is well known for its therapeutic value and has been used in traditional medicine of different cultures throughout the world. The aim of this study was to investigate the anti-inflammatory effect of Malaysian Gelam honey in inflammation-induced rats. Paw edema was induced by a subplantar injection of 1% carrageenan into the rat right hind paw. Rats were treated with the nonsteroidal anti-inflammatory drug (NSAID) Indomethacin (10 mg/kg, p.o.) or Gelam honey at different doses (1 or 2 g/kg, p.o.). The increase in footpad thickness was considered to be edema, which was measured using a dial caliper. Plasma and paw tissue were collected to analyze the production of inflammatory mediators, such as NO, PGE2

... Show More
View Publication
Scopus (138)
Crossref (102)
Scopus Clarivate Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Parallel Routing in Wireless Sensor Network
...Show More Authors

The limitations of wireless sensor nodes are power, computational capabilities, and memory. This paper suggests a method to reduce the power consumption by a sensor node. This work is based on the analogy of the routing problem to distribute an electrical field in a physical media with a given density of charges. From this analogy a set of partial differential equations (Poisson's equation) is obtained. A finite difference method is utilized to solve this set numerically. Then a parallel implementation is presented. The parallel implementation is based on domain decomposition, where the original calculation domain is decomposed into several blocks, each of which given to a processing element. All nodes then execute computations in parall

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Teen-Computer Interaction: Building a Conceptual Model with Thoughts- Emotion-Behaviour
...Show More Authors

Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Thu Jan 02 2020
Journal Name
Journal Of The College Of Languages (jcl)
The use of Arabic-Islamic Theme in The Stories of Western writers: El empleo del material árabe-islámico en las historias de los escritores occidentales
...Show More Authors

This article presents and  explores the theoretical aspect in the use of Arab Islamic theme by the western writers to obtain and achieve individual motives. In this study the model for the theory of Arab presence in Andalusia  , through the book entitled “ Alhamra” by the English writer Washington Erving ,was  analyzed.

The most important results in this research: the success of  the author in the employment of the Islamic history in the formation of the first American legend, Columbus legend, through the selection of the right thoughts to establish his American National theory.  The author compared between the Andalusia experience and the Arab occupation to Spain and the American conquest of the new

... Show More
View Publication Preview PDF
Crossref