Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
On the Estimation of Stress-Strength Model Reliability Parameter of Power Rayleigh Distribution
...Show More Authors

      The aim of this paper is to estimate a single reliability system (R = P, Z > W) with a strength Z subjected to a stress W in a stress-strength model that follows a power Rayleigh distribution. It proposes, generates and examines eight methods and techniques for estimating distribution parameters and reliability functions. These methods are the maximum likelihood estimation(MLE), the exact moment estimation (EMME), the percentile estimation (PE), the least-squares estimation (LSE), the weighted least squares estimation (WLSE) and three shrinkage estimation methods (sh1) (sh2) (sh3). We also use the mean square error (MSE) Bias and the mean absolute percentage error (MAPE) to compare the estimation methods. Both theoretical c

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fibrewise Multi-Perfect Topological Spaces
...Show More Authors

The essential objective of this paper is to introduce new notions of fibrewise topological spaces on D that are named to be upper perfect topological spaces, lower perfect topological spaces, multi-perfect topological spaces, fibrewise upper perfect topological spaces, and fibrewise lower perfect topological spaces. fibrewise multi-perfect topological spaces, filter base, contact point, rigid, multi-rigid, multi-rigid, fibrewise upper weakly closed, fibrewise lower weakly closed, fibrewise multi-weakly closed, set, almost upper perfect, almost lower perfect, almost multi-perfect, fibrewise almost upper perfect, fibrewise almost lower perfect, fibrewise almost multi-perfect, upper* continuous fibrewise upper topol

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
New Operational Matrices of Seventh Degree Orthonormal Bernstein Polynomials
...Show More Authors

Based on analyzing the properties of Bernstein polynomials, the extended orthonormal Bernstein polynomials, defined on the interval [0, 1] for n=7 is achieved. Another method for computing operational matrices of derivative and integration D_b and R_(n+1)^B respectively is presented. Also the result of the proposed method is compared with true answers to show the convergence and advantages of the new method.

View Publication Preview PDF
Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fibrewise Fuzzy Topological Spaces
...Show More Authors

     We introduce and discuss the modern type of fibrewise topological spaces, namely fibrewise fuzzy topological spaces. Also, we introduce the concepts of fibrewise closed fuzzy topological spaces, fibrewise open fuzzy topological spaces, fibrewise locally sliceable fuzzy topological spaces and fibrewise locally sectionable fuzzy topological spaces. Furthermore, we state and prove several theorems concerning these concepts.

View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Structures
The effect of ground motion characteristics on the fragility analysis of reinforced concrete frame buildings in Australia
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Ϣ-Semi-p Open Set :
...Show More Authors

Csaszar introduced the concept of generalized topological space and a new open set in a generalized topological space called -preopen in 2002 and 2005, respectively. Definitions of -preinterior and -preclosuer were given. Successively, several studies have appeared to give many generalizations for an open set. The object of our paper is to give a new type of generalization of an open set in a generalized topological space called -semi-p-open set. We present the definition of this set with its equivalent. We give definitions of -semi-p-interior and -semi-p-closure of a set and discuss their properties. Also the properties of -preinterior and -preclosuer are discussed. In addition, we give a new type of continuous function

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 25 2024
Journal Name
Webology
Is the Stealth Marketing an Element of Promotion Mix? A Review of the Techniques
...Show More Authors

Stealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the

... Show More
View Publication
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Strongly (Completely) Hollow Sub-modules II
...Show More Authors

  Let M be an R-module, where R is commutative ring with unity. In this paper we study the behavior of strongly hollow and quasi hollow submodule in the class of strongly comultiplication modules. Beside this we give the relationships between strongly hollow and quasi hollow submodules with V-coprime, coprime, bi-hollow submodules.

View Publication Preview PDF
Publication Date
Mon Jul 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Continuous Classical Optimal Control Problems for Triple Nonlinear Elliptic Boundary Value Problem
...Show More Authors

     In this research, our aim is to study the optimal control problem (OCP) for triple nonlinear elliptic boundary value problem (TNLEBVP). The Mint-Browder theorem is used to prove the existence and uniqueness theorem of the solution of the state vector for fixed control vector. The existence theorem for the triple continuous classical optimal control vector (TCCOCV) related to the TNLEBVP is also proved. After studying the existence of a unique solution for the triple adjoint equations (TAEqs) related to the triple of the state equations, we derive The Fréchet derivative (FD) of the cost function using Hamiltonian function. Then the theorems of necessity conditions and the sufficient condition for optimality of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Economics And Administrative Sciences
Effect of Public Debt on The Trade Balance in Iraq For The Period (2003-2021)
...Show More Authors

Despite the significant increase in public spending in Iraq, it was not directed toward the important sectors that have an important role in correcting the productive structure. Rather, most of the public expenditure was going to cover the required imports, or to face shocks, whether security or health, and this caused a continuous decrease in the volume of Iraq's exports of goods and services, as the aim of the study was to review the importance of public debt and its impact on the trade balance, as well as to know the economic policies that can contribute to strengthening the trade balance, as the study proved through the (ARDL) model that there is a direct relationship between the domestic debt and the net trade balance, and an invers

... Show More
View Publication Preview PDF
Crossref