Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Psychological effects of electronic games In children and adolescents
...Show More Authors

The proliferation of electronic games, video games and computers has caused children and teenagers to become attracted to these games and become their favorite entertainment. The widespread of these games has generated widespread debate about positive aspects and negative aspects. It is evident that there are two main trends in the impact of electronic games on the behavior of children and adolescents. The first trend is that e-games have positive effects on children and adolescents, especially in cognitive abilities and skills in learning. While the second view sees that electronic games have negative effects that appear in social isolation and lack of movement and aggression. Through the review of previous literature, the current resea

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 30 2019
Journal Name
College Of Islamic Sciences
Extremism in religion Causes, effects and treatment
...Show More Authors

Praise be to God, Lord of the worlds, and prayers and peace be upon His messenger, the mercy of the worlds.
As for after ....
It is clear from the legal texts in the Noble Qur’an and the Sunnah of the Prophet, that Islam is a method that interferes in everything in beliefs, worship, behavior and transactions, and it forbids excess and extremism and mistrust of people and looking at them through a black lens, self-conceit and contempt of others.
In our research, we will try, God willing, to study the phenomenon of religious extremism with its comprehensive dimensions, the position of Islam on it through the verses and hadiths discussed by it, and the diagnosis of the reasons for its emergence and emergence, because if we learn

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal Of Laser
Low Fistula in Ano Treatment using Diode Laser 980nm
...Show More Authors

Anal fistula is an anorectal condition with over 90% of cases being
cryptoglandular in origin and occurring after anorectal abscesses. The traditional method of
treatment of an anal fistula is by excision or de roofing the tract awaiting complete healing.. Aim:
The aim of this study is to assess the efficacy of diode laser 980 nm in the treatment of low fistula in
ano. Methods: The study was performed between June 2019 to end of September 2019, at the
institute of laser for postgraduate study in Baghdad university. A cohort of ten male patients with a
provisional diagnosis of low type anal fistula were selected for this study and treated by interstitial
photothermal therapy of fistula epithelium by diode laser 980nm

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (8)
Scopus Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The use of value chain analysis of information in determining the most important the accounting information
...Show More Authors

The use  analysis  value chain such  information in the provision as financial  so information quality meet and satisfy the needs of users such information , particularly investors and lenders   as the identification needs   financial information and the knowledge as their behavior influenced by that information can be based on the accounting profession to focus on improving their function in order to achieve its goal that satisfying their needs and rationalize their decisions . In accounting thought discovered fertile ground for users preferences as one of the entrances   theorising positive which is based on the need to include knowledge on accounting hypothesis that explain the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Path Planning of an autonomous Mobile Robot using Swarm Based Optimization Techniques
...Show More Authors

This paper presents a meta-heuristic swarm based optimization technique for solving robot path planning. The natural activities of actual ants inspire which named Ant Colony Optimization. (ACO) has been proposed in this work to find the shortest and safest path for a mobile robot in different static environments with different complexities. A nonzero size for the mobile robot has been considered in the project by taking a tolerance around the obstacle to account for the actual size of the mobile robot. A new concept was added to standard Ant Colony Optimization (ACO) for further modifications. Simulations results, which carried out using MATLAB 2015(a) environment, prove that the suggested algorithm outperforms the standard version of AC

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Student Conference On Research And Development
Feature extraction for co-occurrence-based cosine similarity score of text documents
...Show More Authors

View Publication
Scopus (10)
Crossref (9)
Scopus Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Pairwise connectedness in $ check ${$text ${$C$}$$}$ $ ech fuzzy soft bi-closure spaces
...Show More Authors

The concept of Cech fuzzy soft bi-closure space ( ˇ Cfs bi-csp) ( ˇ U, L1, L2, S) is initiated and studied by the authors in [6]. The notion of pairwise fuzzy soft separated sets in Cfs bi-csp is defined in this study, and various features of ˇ this notion are proved. Then, we introduce and investigate the concept of connectedness in both Cfs bi-csps and its ˇ associated fuzzy soft bitopological spaces utilizing the concept of pairwise fuzzy soft separated sets. Furthermore, the concept of pairwise feebly connected is introduced, and the relationship between pairwise connected and pairwise feebly connected is discussed. Finally, we provide various instances to further explain our findings.