Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
The Effect of White Rot Fungus (Ganoderma sp) as Decomposers on Composting Using Combination of Cattle Feces and Water Hyacinth (Eichhornia crassipes) as Organic Matter
...Show More Authors

In Indonesia, cattle feces (CF) and water hyacinth (WH) plants are abundant but have not been widely revealed. The use of microorganisms as decomposers in the fermentation process has not been widely applied, so researchers are interested in studying further. This study was to evaluate the effect of the combination of CF with WH on composting by applying white-rot fungal (WRF) (Ganoderma sp) microorganism as a decomposer. A number of six types of treatment compared to R1(ratio of CF:WH)(25%:75%)+WRF; R2(ratio of CF:WH)(50%:50%)+WRF; R3(ratio of CF:WH)(75%:25%)+WRF; R4(ratio of CF:WH)(25%:75%) without WRF; R5(ratio of CF:WH)(50%:50%) without WRF; R6(ratio of CF:WH)

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jan 04 2019
Journal Name
Journal Of Planner And Development
نمذجة توزيع المدارس الابتدائية في مدينة الفلوجة باستخدام نظم المعلومات الجغرافية G.I.S
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Jan 09 2017
Journal Name
Nauchform
Creolized Text as a Means of Modern Communication: Verbal and Visual Components
...Show More Authors

The article considers a creolized text as a means of modern communication, describing its key verbal and visual components; the relationship of concepts polycode and creolized text has been shown; the universal basic image features have been called; the following kinds of creolized texts have been distinguished; it has been proved that the effective means of attracting the attention of the addressee is the use of expressive font features, which are divided into two groups: topographics (mechanisms of varying of areal syntagmatic of a text) and supragraphcs (change of typeface of font).

Preview PDF
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
Elliptic Curve Cryptography Performance Evaluation for Securing Multi-Factor Systems in a Cloud Computing Environment
...Show More Authors

     In the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Sun Oct 02 2016
Journal Name
Journal Of Educational And Psychological Researches
نظرية الذكاءات المتعددة( دراسة نظرية )
...Show More Authors

Intelligence is the production of nervous system function and it's contents memory and creative thinking and understanding and other processes. It's a general cognitive ability and it's a concept. It's essential for good judgment and reasoning, there's an argument about definition of intelligence, is it one ability or multiple abilities. Multiple intelligences theory presented by (Gardner 1983) view intelligence as composing from six types of intelligences: (1) linguistic. (2) mathematical. (3) visual – spatial. (4) musical. (5) bodily – kinesthetic. (6) personal. Present research has reached to several conclusions. Most important one is that multiple intelligences theory is based on the conception of distinct varieties of intelligen

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
The Intersection Graph of Subgroups of the Dihedral Group of Order 2pq
...Show More Authors

   For a finite group G, the intersection graph   of G is the graph whose vertex set is the set of all proper non-trivial subgroups of G, where two distinct vertices are adjacent if their intersection is a non-trivial subgroup of G. In this article, we investigate the detour index, eccentric connectivity, and total eccentricity polynomials of the intersection graph  of subgroups of the dihedral group  for distinct primes . We also find the mean distance of the graph  .

View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Emergency Messages Dissemination Challenges Through Connected Vehicles for Efficient Intelligent Transportation Systems: A Review
...Show More Authors

Recent growth in transport and wireless communication technologies has aided the evolution of Intelligent Transportation Systems (ITS). The ITS is based on different types of transportation modes like road, rail, ocean and aviation. Vehicular ad hoc network (VANET) is a technology that considers moving vehicles as nodes in a network to create a wireless communication network. VANET has emerged as a resourceful approach to enhance the road safety. Road safety has become a critical issue in recent years. Emergency incidents such as accidents, heavy traffic and road damages are the main causes of the inefficiency of the traffic flow. These occurrences do not only create the congestion on the road but also increase the fuel consumption and p

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Mar 29 2018
Journal Name
Iproceedings
Effect of Reminding Parents on Vaccination Dates Using Mobile Short Messages on the Routine Vaccination Coverage of Infants in Al Resafa-Baghdad, 2015-2016
...Show More Authors

View Publication
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
SURVEYS MEASUREMENT OF PUBLIC OPINION BETWEEN THEORY AND PRACTICE
...Show More Authors

The majority of statisticians, if not most of them, are primarily concerned with the theoretical aspects of their field of work rather than their application to the practical aspects. Its importance as well as its direct impact on the development of various sciences. Although the theoretical aspect is the first and decisive basis in determining the degree of accuracy of any research work, we always emphasize the importance of the applied aspects that are clear to everyone, as well as its direct impact on the development of different sciences. The measurements of public opinion is one of the most important aspects of the application of statistics, which has taken today, a global resonance and has become a global language that everyone can

... Show More
View Publication Preview PDF
Crossref