Preferred Language
Articles
/
bsj-5062
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters. 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Disclosure of insurance services and its impact: On the performance of companies
...Show More Authors

The objective of the research is to identify the nature of voluntary disclosure of insurance services and its impact on the financial performance of Iraqi insurance companies by knowing the relationship between increasing disclosure of financial services and financial performance indicators of insurance companies.In order to achieve this objective, the research was applied to a sample of the Iraqi insurance companies listed in the Iraqi Stock Exchange (Al Amin Insurance Company, Al Ahlia Insurance, Dar Al Salam Insurance, Gulf Insurance, Al Hamra Insurance) and based on their published financial statements (2014-2015) ) And by analyzing the sample lists were connected to the research objectives.The main conclusion of the study is that in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
The Mutual Interaction effects between Array Antenna Parameters and Receiving Signals Bandwidth
...Show More Authors

The presence of a single complex adaptive weight in each element channel of an adaptive array antenna is sufficient for processing of narrowband signals. The ability of an adaptive array antenna to null interference deteriorates rapidly as the interference bandwidth increases. The performance of narrowband adaptive array antenna with LMCV Beamforming algorithm is examined. The interaction effects between received signal angle of arrival and array parameters like the interelement spacing and the number of array element and the received signal bandwidth were studied. The output Signal to Interference plus Noise Ratio (SINR) and Interference to Noise Ratio (INR) are used as performance parameters for evaluation of these effects. It is found

... Show More
View Publication Preview PDF
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Mar 25 2020
Journal Name
International Journal Of Drug Delivery Technology
Preparation, Characterization and In-Vitro Diffusion Study of Different Topical Flurbiprofen Semisolids
...Show More Authors

Flurbiprofen (FLB) is chemically 2-(3- fluoro-4-phenyl phenyl) propanoic acid. It is a nonsteroidal anti-inflammatory drug (NSAID) used in the treatment of rheumatoid arthritis and osteoarthritis. Oral administration of this drug is associated with severe gastrointestinal side effects like ulceration and gastrointestinal bleeding. The solution to this problem lies in the fact that topically applied NSAIDs are safer than orally. This study aims to prepare different topical semisolid formulation of FLB as cream base (o/w), (w/o) and gel base using different gel-forming agents in different concentrations. Comparing characterization properties in addition to release and diffusion study for all the prepared formulas to select the best on

... Show More
View Publication
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Wed May 10 2017
Journal Name
Journal Of The College Of Languages (jcl)
Die literarische Übersetzung und Deutlichkeit dem Leser Literary Translation and Receive Manifestation
...Show More Authors

Die Forschung geht  um das wichtigste Thema für die literarischen Studien, die um die literarische Übersetzung und die Deutlichkeit dem Leser gekreist sind. Die literarische Übersetzung ist ein schwieriger Prozess, der auf vielseitigen Faktoren beruht ist, damit es erfolgreich gelungen ist. Dies ist auch ein gemeinsamer Prozess durch das Kunstwerk zwischen dem Autor und Übersetzer, so dass der erste Schritt in der vorliegenden Forschung wie folgendes lautet: muss es der Autor genau bestimmt wird, wie er die methodischen Grundprinzipien des Wekes im Dienst der zentralen Idee formuliert, und wie er die literarische Gestalt durch die voll erfassende Vorstellung des Wekes dichtet. Denn die literarische Arbeit besteht aus zwei Teilen

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Indian Journal Of Ecology
Isolation and molecular identification of yersinia entercolitica in Bovine Meat in Iraq
...Show More Authors

Preview PDF
Scopus
Publication Date
Fri Mar 31 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Effect of Temperature on the Stability and Release Profile of Ibuprofen Microcapsules
...Show More Authors

The stability and releasing profile of 2:1 core: wall ratio ibuprofen microcapsules prepared by aqueous coacervation (gelatin and acacia polymers coat) and an organic coacervation methods (ethyl cellulose and sodium alginate polymers coat) in weight equivalent to 300mg drug, were studied using different storage temperatures 40°C, 50°C ,60°C and refrigerator temperature 4°C in an opened and closed container for three months (releasing profile) and four months (stability study).It was found that, these ibuprofen microcapsules were stable with expiration dates of 4.1 and 3.1 years for aqueous and an organic method respectively.Aqueous prepared ibuprofen microcapsules were found more stable than those microcapsules prepared by or

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The role of competitive intelligence and reverse engineering to achieve competitive advantage
...Show More Authors

Abstract

In light of the great technological development and the emergence of globalization has increased global competition, where it became competitive exercise pressure on all sectors. In light of this companies mast enviorment depend on the means that keeps them on the competitive position through access to information about competitors in order to help them to draw a strategy that will achieve a competitive edge either through excellence or reduce the costs of their products and this means intelligence competitive and reverse engineering that help to gain information on competitors analyze and put of the decision-maker From this point formed the idea of ​​research in the statement of the role of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
The dynamics of a delayed ecological model with predator refuge and cannibalism
...Show More Authors

This study has contributed to understanding a delayed prey-predator system involving cannibalism. The system is assumed to use the Holling type II functional response to describe the consuming process and incorporates the predator’s refuge against the cannibalism process. The characteristics of the solution are discussed. All potential equilibrium points have been identified. All equilibrium points’ local stability analyses for all time delay values are investigated. The system exhibits a Hopf bifurcation at the coexistence equilibrium, which is further demonstrated. The center manifold and normal form theorems for functional differential equations are then used to establish the direction of Hopf bifurcation and the stability of the per

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
On Semigroup Ideals and Right n-Derivation in 3-Prime Near-Rings
...Show More Authors

 The current paper studied the concept of right n-derivation satisfying certified conditions on semigroup ideals of near-rings and some related properties. Interesting results have been reached, the most prominent of which are the following: Let M be a 3-prime left near-ring and A_1,A_2,…,A_n are nonzero semigroup ideals of M, if d is a right n-derivation of M satisfies on of the following conditions,
d(u_1,u_2,…,(u_j,v_j ),…,u_n )=0 ∀ 〖 u〗_1 〖ϵA〗_1 ,u_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n ϵA〗_u;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=0 ∀u_1,v_1 〖ϵA〗_1,u_2,v_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n,v_n ϵA〗_u ;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=(u_

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref