Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Equilibrium, Kinetic, and Thermodynamic Study of Removing Methyl Orange Dye from Aqueous Solution Using Zizphus spina-christi Leaf Powder
...Show More Authors

In this study, Zizphus spina-christi leaf powder was applied for the adsorption of methyl orange. The effect of different operating parameters on the Batch Process adsorption was investigated such as solution pH (2-12), effect of contact time (0-60 min.), initial dye concentration (2-20 mg/L), effect of adsorbent dosage (0-4.5 g) and effect of temperature (20-50ᵒC). The results show a maximum removal rate and adsorption capacity (%R= 23.146, qe = 2.778 mg/g) at pH = 2 and equilibrium was reached at 40 min. The pseudo- second-order kinetics were found to be best fit for the removal process (R2 = 0.997). Different isotherm models (Langmuir, Freundlich, Dubini-Radushkevich,Temkin)  were applied in this stud

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Jun 07 2023
Journal Name
Journal Of Educational And Psychological Researches
Developing the Skill of Friendship for Kindergarten Children in the Light of Bandura's Theory Social Learning: Ministry of Education / Baghdad Directorate of Education, Al/Rusafa
...Show More Authors

The current research aims to identify the effect of the program to develop the skill of friendship among kindergarten children, as well as the scope of the impact of the program on the sample. To achieve the objectives of the research, the researcher hypothesizes there is no significant difference between the average scores of the sample members on the friendship skill scale for the dimensional scale according to the experimental and control group. The research sample consisted of (60) girl and boy with age ranges (4-6) who were randomly selected from the Kindergarten Unity at Baghdad city/ Rusafa 1. The children were distributed into an experimental and control group, each group consists of (30) girl and boy. The two groups were chosen

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 25 2019
Journal Name
Iraqi Journal Of Physics
Nuclear level density with proton resonance using Gaussian orthogonal ensemble theory
...Show More Authors

The Gaussian orthogonal ensemble (GOE) version of the random matrix theory (RMT) has been used to study the level density following up the proton interaction with 44Ca, 48Ti and 56Fe.

A promising analysis method has been implemented based on the available data of the resonance spacing, where widths are associated with Porter Thomas distribution. The calculated level density for the compound nuclei 45Sc,49Vand 57Co shows a parity and spin dependence, where for Sc a discrepancy in level density distinguished from this analysis probably due to the spin  misassignment .The present results show an acceptable agreement with the combinatorial method of level density.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 06 2014
Journal Name
Journal Of Educational And Psychological Researches
Effectiveness of cooperative learning in at the implementation of floral material for celli graph and decoration
...Show More Authors

The purpose of this resesrh know (the effectiveness of cooperative lerarning implementation of floral material for calligraphy and ornamentation) To achieve the aim of the research scholar put the two zeros hypotheses: in light of the findings of the present research the researcher concluded a number of conclusions, including: -
1 - Sum strategy helps the learner to be positive in all the information and regulations, monitoring and evaluation during the learning process.
2 - This strategy helps the learner to use information and knowledge and their use in various educational positions, and to achieve better education to increase its ability to develop thinking skills and positive trends towards the article.
In light of this, the

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Tue Jan 31 2017
Journal Name
Journal Of Engineering
Static Analysis of Laminated Composite Plate using New Higher Order Shear Deformation Plate Theory
...Show More Authors

 In the present work a theoretical analysis depending on the new higher order . element in shear deformation theory for simply supported cross-ply laminated plate is developed. The new displacement field of the middle surface expanded as a combination of exponential and trigonometric function of thickness coordinate with the transverse displacement taken to be constant through the thickness. The governing equations are derived using Hamilton’s principle and solved using Navier solution method to obtain the deflection and stresses under uniform sinusoidal load. The effect of many design parameters such as number of laminates, aspect ratio and thickness ratio on static behavior of the laminated composite plate has been studied. The

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 16 2023
Journal Name
مجلة الاستاذ للعلوم الانسانية والاجتماعية- كلية التربية ابن رشد – جامعة بغداد،
Using the Theory of Conceptual Metaphor in Two Sonnets by Victorian Female Poets
...Show More Authors

This study has applied the theoretical framework of conceptual metaphor theory to the analysis of the source and target domains of metaphors that are used in two English nineteenth century sonnets, both written by contemporaneous female poets. The quantitative and qualitative results of the textual analysis have clearly revealed that Elizabeth Barrett Browning’s sonnet 23 centres around the conceptual mapping of the journey of love and life with that of possession. In contrast, Christina Rossetti’s sonnet Remember tackles the central conceptual mapping of death as a journey in relation to its further experiential connections. In addition, the application of conceptual metaphor theory in identifying the frequencies and densities of metap

... Show More
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
An Analytic Solution for Riccati Matrix Delay Differential Equation using Coupled Homotopy-Adomian Approach
...Show More Authors

An efficient modification and a novel technique combining the homotopy concept with  Adomian decomposition method (ADM) to obtain an accurate analytical solution for Riccati matrix delay differential equation (RMDDE) is introduced  in this paper  . Both methods are very efficient and effective. The whole integral part of ADM is used instead of the integral part of homotopy technique. The major feature in current technique gives us a large convergence region of iterative approximate solutions .The results acquired by this technique give better approximations for a larger region as well as previously. Finally, the results conducted via suggesting an efficient and easy technique, and may be addressed to other non-linear problems.

View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Arab Science Heritage Journal
ملامح التلطف في نهج البلاغة الرسائل والوصايا انموذجاً
...Show More Authors

This study aims to look in the commandments and letters of Imam

 Abi Talib (A.S.) that narrated in the (Nehj Albalagah). In addition the researcher will study the method of kindness and and sentences structures of

View Publication Preview PDF