Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Continuous Classical Optimal Control Problems for Triple Nonlinear Elliptic Boundary Value Problem
...Show More Authors

     In this research, our aim is to study the optimal control problem (OCP) for triple nonlinear elliptic boundary value problem (TNLEBVP). The Mint-Browder theorem is used to prove the existence and uniqueness theorem of the solution of the state vector for fixed control vector. The existence theorem for the triple continuous classical optimal control vector (TCCOCV) related to the TNLEBVP is also proved. After studying the existence of a unique solution for the triple adjoint equations (TAEqs) related to the triple of the state equations, we derive The Fréchet derivative (FD) of the cost function using Hamiltonian function. Then the theorems of necessity conditions and the sufficient condition for optimality of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Economics And Administrative Sciences
Effect of Public Debt on The Trade Balance in Iraq For The Period (2003-2021)
...Show More Authors

Despite the significant increase in public spending in Iraq, it was not directed toward the important sectors that have an important role in correcting the productive structure. Rather, most of the public expenditure was going to cover the required imports, or to face shocks, whether security or health, and this caused a continuous decrease in the volume of Iraq's exports of goods and services, as the aim of the study was to review the importance of public debt and its impact on the trade balance, as well as to know the economic policies that can contribute to strengthening the trade balance, as the study proved through the (ARDL) model that there is a direct relationship between the domestic debt and the net trade balance, and an invers

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Spe Kingdom Of Saudi Arabia Annual Technical Symposium And Exhibition
Optimization of Infill Drilling in Whicher Range Field in Australia
...Show More Authors
Abstract<p>Now that most of the conventional reservoirs are being depleted at a rapid pace, the focus is on unconventional reservoirs like tight gas reservoirs. Due to the heterogeneous nature and low permeability of unconventional reservoirs, they require a huge number of wells to hit all the isolated hydrocarbon zones. Infill drilling is one of the most common and effective methods of increasing the recovery, by reducing the well spacing and increasing the sweep efficiency. However, the problem with drilling such a large number of wells is the determination of the optimum location for each well that ensures minimum interference between wells, and accelerates the recovery from the field. Detail</p> ... Show More
View Publication
Scopus (15)
Crossref (8)
Scopus Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison of Bayes Estimators for the parameter of Rayleigh Distribution with Simulation
...Show More Authors

   A comparison of double informative and non- informative priors assumed for the parameter of Rayleigh distribution is considered. Three different sets of double priors are included, for a single unknown parameter of Rayleigh distribution. We have assumed three double priors: the square root inverted gamma (SRIG) - the natural conjugate family of priors distribution, the square root inverted gamma – the non-informative distribution, and the natural conjugate family of priors - the non-informative distribution as double priors .The data is generating form three cases from Rayleigh distribution for different samples sizes (small, medium, and large). And Bayes estimators for the parameter is derived under a squared erro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On A Bitopological (1,2)*- Proper Functions
...Show More Authors

   In this paper, we introduce a new type of functions in bitopological spaces, namely, (1,2)*-proper functions. Also, we study the basic properties and characterizations of these functions . One of the most important of equivalent definitions to the (1,2)*-proper functions is given by using (1,2)*-cluster points of filters . Moreover we define and study (1,2)*-perfect functions and (1,2)*-compact functions in bitopological spaces and we study the relation between (1,2)*-proper functions and each of (1,2)*-closed functions , (1,2)*-perfect functions and (1,2)*-compact functions and we give an example when the converse may not be true .
 

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
An excerpt on the analysis of correlate constructions: Exkurs zur Analyse der Korrelatkonstruktionen
...Show More Authors

The main idea that led me to write such research paper within the framework of Germanic linguistics is that I have not found any topic dealing with the term correlate in the German language, except in several articles in linguistic journals as well as one topic in a book describing the use of such a linguistic phenomenon in the language system. The research initially deals with the definition of the correlate at the level of the German language system. Correlate is unity describes specific relation of two sentences and identifies denoted constructs. Correlate is called a placeholder at the syntactic level because it does not occupy its original topological fields in the syntactic structure. The correlate (es) or the prepositiona

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 06 2021
Journal Name
College Of Islamic Sciences
Linguistic deposits in the Arabic language
...Show More Authors

 

Abstract of the research:

     This research sheds light on an important phenomenon in our Arabic language, which is linguistic sediments, and by which we mean a group of vocabulary that falls out of use and that native speakers no longer use it, and at the same time it happens that few individuals preserve the phenomenon and use it in their lives, and it is one of the most important phenomena that  It should be undertaken and studied by researchers;  Because it is at the heart of our huge linguistic heritage, as colloquial Arabic dialects retain a lot of linguistic sediments, and we usually find them at all levels of language: phonetic, banking, grammatical and semantic.  In the

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Comparison Among Three Estimation Methods to Estimate Cascade Reliability Model (2+1) Based On Inverted Exponential Distribution
...Show More Authors

      In this paper, we are mainly concerned with estimating cascade reliability model (2+1) based on inverted exponential distribution and comparing among the estimation methods that are used . The maximum likelihood estimator and uniformly minimum variance unbiased estimators are used to get  of the strengths  and the stress ;k=1,2,3 respectively then, by using the unbiased estimators, we propose Preliminary test single stage shrinkage (PTSSS) estimator when a prior knowledge is available for the scale parameter as initial value due past experiences . The Mean Squared Error [MSE] for the proposed estimator is derived to compare among the methods. Numerical results about conduct of the considered

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
Fibrewise slightly topological spaces
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Al-nahrain Journal Of Science (anjs)
Fibrewise Pairwise Bi-Topological Spaces
...Show More Authors

The main idea of this research is to consider fibrewise pairwise versions of the more important separation axioms of ordinary bitopology named fibrewise pairwise - spaces, fibrewise pairwise - spaces, fibrewise pairwise - spaces, fibrewise pairwise -Hausdorff spaces, fibrewise pairwise functionally -Hausdorff spaces, fibrewise pairwise -regular spaces, fibrewise pairwise completely -regular spaces, fibrewise pairwise -normal spaces and fibrewise pairwise functionally -normal spaces. In addition we offer some results concerning it.

Preview PDF