Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 25 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Spectrophotometric Determination of Cefixime Following Simple Diazotization and Coupling with ?-Naphthol
...Show More Authors

Cefixime (CFX) was treated with sodium nitrite and hydrochloric acid for diazotization reaction followed by coupling with ?-Naphthol in alkaline medium to form, a yellow colored azo dye compound which exhibits maximum absorption (?max) at 412 nm where the concentration of (CFX) was determined spectrophotometrically. The optimum reaction conditions and other analytical parameters were evaluated. Beer’s law was obeyed in the concentration range of (1-20) ?g.mL-1 with a molar absorptivity of 34870.5 L.mol-1.cm-1. The limit of detection was found to be 0.1090 ?g.mL-1 and the Sandell's sensitivity value was 0.0130 ?g.cm-2. The proposed method could be successfully applied to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Application of levofloxacin and doxycycline in treatment of vaginal chlamydial infection
...Show More Authors

Doxycycline and levofloxacin are heterocyclic organic compounds that are now popularly used to treat some bacterial infections. In this study which was conducted on patients from a private clinic, we compared the use of two commonly used antibiotics for the treatment of diagnosed cases with vaginal chlamydial infection: levofloxacin and doxycycline. Vaginal chlamydial infection is considered to be a very common sexually transmitted infection. It may have minimal symptoms which can lead to neglect by the patient until it leads to some important complications among which is the inability to become pregnant. This indicates early diagnosis and treatment of this infection. By comparing the results of treatment we concluded that there is no much

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Aug 01 2007
Journal Name
Al-nahrain Journal For Engineering Sciences
Monitoring and Control on Impressed Current Cathodic Protection for Oil Pipelines
...Show More Authors

This research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 04 2021
Journal Name
Iium Engineering Journal
RELIABLE ITERATIVE METHODS FOR SOLVING 1D, 2D AND 3D FISHER’S EQUATION
...Show More Authors

In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Political Sciences Journal
Foreign direct investment in Iraq and its role in economic development
...Show More Authors

الاستثمار الاجنبي المباشر في العراق ودوره في تحقيق التنمية الاقتصادية

View Publication Preview PDF
Crossref
Publication Date
Sun Oct 21 2018
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Thrombocytosis and CA125 as Predictor of Malignancy in Gynaecological Pelvic Mass
...Show More Authors

Background: Pelvic masses are common in women & can present at any age of woman life, it could be benign or malignant mass and may originate from gynecological organs like cervix, uterus, uterine adnexia, or from other pelvic organs like intestine, bladder, ureters, skeletal muscle, and bone.Objective: We attempted to determine the increasing of platelet counts(> 450.000 /micro liter) and CA125serum level (> 35 U/mL) as useful tools for predicting and confirming malignancy in gynecological pelvic mass.Patients and methods: A prospective unmatched hospital based case-control study carried out at Baghdad Teaching Hospital, about 126 women were enrolled in our study, divided into two groups 60 women were control group (free o

... Show More
Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of University Of Anbar For Pure Science
A Short Review: Chemistry of Curcumin and Its Metal Complex Derivatives
...Show More Authors

This review covers recent progress in the synthesis of curcumin and the bioactivity of semisynthetic and synthetic analogs of curcumin. The review also shows how curcumin is a useful intermediate for the synthesis of more complex organic molecules; historical perspective; the process of preparing the metal complexes and characterization the produced complexes using various spectral and other techniques; shows the importance of curcumin and its derivatives for their potential applications in medical devices and broad-spectrum of medical application such as antibiotic ointment, alternative therapeutics, antifungal, and antibacterial activities

Publication Date
Sat Jan 01 2022
Journal Name
Lecture Notes In Electrical Engineering
Dynamics Modeling and Motion Simulation of a Segway Robotic Transportation System
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Treatment of Kaposi’s Sarcoma by Combination of Zinc Sulfate and Propranolol
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Wed May 26 2021
Journal Name
Communications In Mathematical Biology And Neuroscience
Modelling and stability analysis of the competitional ecological model with harvesting
...Show More Authors

The interplay of predation, competition between species and harvesting is one of the most critical aspects of the environment. This paper involves exploring the dynamics of four species' interactions. The system includes two competitive prey and two predators; the first prey is preyed on by the first predator, with the former representing an additional food source for the latter. While the second prey is not exposed to predation but rather is exposed to the harvest. The existence of possible equilibria is found. Conditions of local and global stability for the equilibria are derived. To corroborate our findings, we constructed time series to illustrate the existence and the stability of equilibria numerically by varying the different values

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (1)
Scopus Clarivate Crossref