Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
أسلوب بيز في تحليل البيانات غير التامة
...Show More Authors

In this paper we will explain ,how use Bayesian procedure in analysis multiple linear regression model with missing data in variables X's  as the new method suggest , and explain some of missing  Patterns under missing mechanism , missing complete at random MCAR and compare Bayesian estimator with complete case estimator by use  simulation procedure .           

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Deposit insurance system and its role in financial security for the period (2010-2018) Study the experiences of Selected countries with reference to Iraq
...Show More Authors

Founding a System to secure deposits and protecting the depositors is considered one of the important and exchanged subjects out there in the banking system/field in Iraq at the current time, and the reason behind the exchange and spread of this subject is due to the financial crisis of which the banking sector is suffering from and the stumbling of many banks, those factors have had led to the insecurity of the depositors and their mistrust towards banks, thus, it is necessary to create a system to secure deposits in which depositors would be compensated for the losses caused by the banks' failures. in addition, it could be a countermeasure system which maintains the banking stability, protects the rights of depositors and gains

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Water Treatment Using Zinc Nanoparticles and Apricot Plant Extracts from Organic and Inorganic Pollution
...Show More Authors

 

The apricot plant was washed, dried, and powdered after harvesting to produce a fine powder that was used in water treatment. created an alcoholic extract from the apricot plant using ethanol, which was then analysed using GC-MS, Fourier transform infrared spectroscopy, and ultraviolet-visible spectroscopy to identify the active components. Zinc nanoparticles were created using an alcoholic extract. FTIR, UV-Vis, SEM, EDX, and TEM are used to characterize zinc nanoparticles. Using a continuous processing procedure, zinc nanoparticles with apricot extract and powder were employed to clean polluted water. Firstly, 2 g of zinc nanoparticles were used with 20 ml of polluted water, and the results were Tetra 44% and Levo 32%; after

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Investigation of Aluminum Arsenide Honeycomb Monolayer via Density Functional Theory
...Show More Authors

    First principle calculations are performed to theoretically predict the physical properties of hexagonal aluminium arsenide planar and buckled monolayers. The structural characteristics showed that the buckled parameter is about 0.32 A°. Cohesive energies have favourable values and it indicates the fabrication possibility. Phonon dispersion properties indicated that the planar aluminium arsenic monolayers are dynamically unstable, while the buckled is less dynamically unstable. The elastic constant parameters achieved the required characteristics of stable hexagonal monolayer structures. The study of electronic band structure prefers to indirect semiconductor band gaps, and the density of states showed strong orbital hybridizati

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Baghdad Science Journal
Hepatocellular Carcinoma Prediction and early Diagnosis of Hepatitis B and C viral infection using miR-122 and miR-223 in a sample of Iraqi patients.
...Show More Authors

Hepatocellular carcinoma (HCC) is the third most common cause of cancer-related death. Therefore, it is critical for researchers to understand molecular biology in greater depth.  In several diseases including cancer, abnormal miRNA expression has been linked to apoptosis, proliferation, differentiation, and metastasis. Many miRNAs have been studied in relation to cancer, including miR-122, miR-223, and others. Hepatitis B and C viruses are the most important global risk factors for HCC. This study is intended to test whether serum miRNAs serve as a potential biomarker for both HCC and viral infections HBV and C. The expression of miRNA in 64 serum samples was analyzed by RT-qPCR. Compared to healthy volunteers, HCC patients' sera expre

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Geolocation Android Mobile Phones Using GSM/UMTS
...Show More Authors

The proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Comparative Study of Image Denoising Using Wavelet Transforms and Optimal Threshold and Neighbouring Window
...Show More Authors

NeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among

... Show More
View Publication Preview PDF
Publication Date
Mon May 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Calculation the Cross Sections of 10B(n,p)10Be Reaction by Using the Reciprocity Theory for the First Excited State
...Show More Authors

  In this study light elements 10B , 10Be for 10B(n,p)10Be reaction as well as proton energy from 0.987 MeV to 2.028 MeV with threshold energy (1.04MeV) are used according to the available data of reaction cross sections. The more recent cross sections data of 10Be(p,n)10B reaction is reproduced in fin steps in the specified energy range , as well as cross section (p,n) values were derived from the published data of (n,p) as a function of energy in the same fine energy steps by using the reciprocity theory of principle inverse reaction . This calculation involves only the first excited state of  10B , 10Be in the reactions 10Be(p,n)10B and  10B(n,p)10Be. 

View Publication Preview PDF