Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 17 2022
Journal Name
Al–bahith Al–a'alami
The role of public relations in educating the Palestinian public about the issue of prisoners under the occupation An applied study on the employees of the Ministry of Detainees and Ex-Prisoners Affairs
...Show More Authors

The issue of Palestinian prisoners inside the prisons of the Israeli occupation is considered
a humanitarian issue par excellence، as it affects every Palestinian family as a
result of the absence of a husband، wife or son.
Almost no Palestinian house is vacant without one or more prisoners، and even women،
children and the elderly are not spared from these arrests.
The problem of the study was to identify the role of public relations in the Ministry
of Detainees and Ex-Prisoners Affairs in educating the Palestinian public about the
issue of prisoners، the nature of this role and the means used to bring support and
solidarity with this important and sensitive issue through the applied study on the
employee

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Oct 04 2923
Journal Name
Journal Of Sustainable Studies
Enantiosemy in a Comparative Aspect: On the Material of Modern Russian and Arabic Languages Энантиосемия в сравнительном аспекте: На материале современного русского и арабского языков التضاد - دراسة مقارنة : اللغات الروسية والعربية الحذيثة أنمورجا
...Show More Authors

This work is devoted to a comparative study of the phenomenon of enantiosemy in Russian and Arabic.Everyone knows the term antonyms - words of the same part of speech, opposite in meaning, such as: Day and night, white and black, truth and lies. But in Russian, Arabic and other languages there is an interesting phenomenon, which consists in the fact that one word has two opposite meanings. Such a phenomenon in linguistics is called enantiosemy (from the Greek words enantios - "opposite" and sema - "sign")

Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The compatibility of the Development Fund for Iraq to the requirements of sovereign wealth funds An analytical study of the legal framework and institutional structure in accordance with the standards of the Santiago
...Show More Authors

Sovereign wealth funds have attracted the attention of the governments of the oil and non-oil countries alike, with a variation of the size of those funds to those states, based on the size of the financial surpluses resulting from Alriadat oil or foreign reserves, or state revenues for other sovereign assets. Raj use these funds remarkably during the financial crises the world has seen, including the crisis of 2008-2007., And Iraq is a oil-producing countries, which has the third largest reserves of crude oil (Crude Oil) at the level of the Arab world and of 140 300)) million barrels after Saudi Saudi Arabia and the Islamic Republic of Iran, and the fourth reserves of crude oil in the world after issued Venezuela to the reserve

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 02 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Application of banking institutions' governance variables and their impact on financial performance as measured by (ROA & ROE): an applied study on a sample of local Islamic banks listed on the Iraq Stock Exchange
...Show More Authors

The research seeks to achieve its goal of demonstrating the impact of applying banking governance variables on the financial performance of Islamic banks, and the independent research variables are represented by (X) by (the number of independent members in the board (X1), the number of directors in the board (X2), the number of committees emanating from the board ( X3), the percentage of shares owned by major shareholders in the board (X4), the number of members of the Sharia supervisory board (X5)), and the dependent variable (Y) is represented by (rate of return on assets (Y1), rate of return on equity (Y2)).

The research sample included (4) Islamic banks, namely (Iraqi Islamic Bank, National Islamic Bank, Jihan Islamic Bank,

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Computing
Twitter Location-Based Data: Evaluating the Methods of Data Collection Provided by Twitter Api
...Show More Authors

Twitter data analysis is an emerging field of research that utilizes data collected from Twitter to address many issues such as disaster response, sentiment analysis, and demographic studies. The success of data analysis relies on collecting accurate and representative data of the studied group or phenomena to get the best results. Various twitter analysis applications rely on collecting the locations of the users sending the tweets, but this information is not always available. There are several attempts at estimating location based aspects of a tweet. However, there is a lack of attempts on investigating the data collection methods that are focused on location. In this paper, we investigate the two methods for obtaining location-based dat

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 16 2019
Journal Name
Al–bahith Al–a'alami
Journalistic recruitment for the Infographics news sites Bairaq hussien jumhaa al ruba
...Show More Authors

The aim of the research is to find out the methods of employing the : Infographics in the news sites due to the different communicative roles of the : Infographics . To achieve the research objective, the researcher used the survey method: the method of analyzing the content to analyze the : Infographics material from the selected sample of the news sites. What was said ? And how was it said? Through the design of a content analysis form that includes a number of studied analysis Infographics of the study.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
CART_based Approach for Discovering Emerging Patterns in Iraqi Biochemical Dataset
...Show More Authors

    This paper is intended to apply data mining techniques for real Iraqi biochemical dataset to discover hidden patterns within tests relationships. It is worth noting that preprocessing steps take remarkable efforts to handle this type of data, since it is pure data set with so many null values reaching a ratio of 94.8%, then it becomes 0% after achieving these steps. However, in order to apply Classification And Regression Tree (CART) algorithm, several tests were assumed as classes, because of the dataset was unlabeled. Which then enabled discovery of patterns of tests relationships, that consequently, extends its impact on patients’ health, since it will assist in determining test values by performing only relevant

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Nov 29 2018
Journal Name
Iraqi Journal Of Science
A new Color image Encryption based on multi Chaotic Maps
...Show More Authors

     This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of   1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.   

View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Scoping Study on Lightweight Cryptography Reviews in IoT
...Show More Authors

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Security of Wireless Sensor Nodes
...Show More Authors

Due to the large-scale development in satellite and network communication technologies, there is a significant demand for preserving the secure storage and transmission of the data over the internet and shared network environments. New challenges appeared that are related to the protection of critical and sensitive data
from illegal usage and unauthorized access. In this paper, we address the issues described above and develop new techniques to eliminate the associated problems. To achieve this, we propose a design of a new sensor node for tracking the location of cars and collecting all information and all visited locations by cars, followed by
encryption in a sensor node and saving in the database. A microcontroller of Arduino es

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref