Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 20 2019
Journal Name
Iet Circuits, Devices & Systems
Multi‐bit error control coding with limited correction for high‐performance and energy‐efficient network on chip
...Show More Authors

In the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Eastern-european Journal Of Enterprise Technologies
Implementation of artificial neural network to achieve speed control and power saving of a belt conveyor system
...Show More Authors

According to the importance of the conveyor systems in various industrial and service lines, it is very desirable to make these systems as efficient as possible in their work. In this paper, the speed of a conveyor belt (which is in our study a part of an integrated training robotic system) is controlled using one of the artificial intelligence methods, which is the Artificial Neural Network (ANN). A visions sensor will be responsible for gathering information about the status of the conveyor belt and parts over it, where, according to this information, an intelligent decision about the belt speed will be taken by the ANN controller. ANN will control the alteration in speed in a way that gives the optimized energy efficiency through

... Show More
View Publication
Scopus (17)
Crossref (6)
Scopus Crossref
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref
Publication Date
Wed Aug 23 2023
Journal Name
International Journal Of Mental Health Nursing
Self and public stigma towards mental illnesses and its predictors among university students in 11 Arabic‐speaking countries: A multi‐site study
...Show More Authors
Abstract<p>This study aimed to explore self and public stigma towards mental illness and associated factors among university students from 11 Arabic‐speaking countries. This cross‐sectional study included 4241 university students recruited from Oman, Saudi Arabia, the United Arab Emirates (UAE), Syria, Sudan, Bahrain, Iraq, Jordan, Lebanon, Palestine and Egypt. The participants completed three self‐administrative online questionnaires—Demographic Proforma (age, gender, family income, etc.), Peer Mental Health Stigmatization Scale and Mental Health Knowledge Questionnaire. There was a significant difference in the average mean between the 11 countries (<italic>p</italic> < 0.01) based on</p> ... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Educational And Psychological Researches
Analysis of Palestinian Ministry of Education Test Results in Mathfor Eighth Graders basic Public Schools in Tulkarm
...Show More Authors

هدفت هذه الدراسة إلى تحليل نتائج الاختبار الوطني الموحد الذي تطبقه وزارة التربية والتعليم الفلسطينية في مادة الرياضيات لطلبة الصف الثامن الأساسي في المدارس الحكومية في محافظة طولكرم، وذلك لمعرفة مستوى الطلبة على هذا الاختبار في ضوء متغيرات الجنس والمنطقة التعليمية ونوع المدرسة، ومعرفة علاقة التحصيل على هذا الاختبار بتحصيل الطلبة المدرسي والمعدل العام. ولتحقيق ذلك تم تحليل درجات (3218) طالباً وطالبة؛ وهم ي

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
Journal Of Educational And Psychological Researches
أثر استعمال الوسائل التعليمية للكتاب المدرسي ورسومات المعلم التوضيحية في تحصيل المعلومات التاريخية واستبقائها
...Show More Authors

The research aims to determine the impact of the use of teaching aids for the textbook and graphics teacher illustrations in the collection of historical information and retention, limited research on a sample of students in grade five numbered (68) primary school students of Benin in Baghdad governorate / Breeding Rusafa First, select the researchers of scientific material for students in research Topics are the first and second chapter of the Book of the Arab-Islamic history, set by the Ministry of Education.

 And promising targets behavioral and according to the content of subject numbered (100) goal and lesson plans exemplary nu

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Studying the Connection Between Partical Size and Lattice Distortions Through X - Ray Diffraction Line Profile Analysis for CaO Powder
...Show More Authors

The integral  breadth  method  has been utilized to analyse line

proIiles broadening and lattice strain of CaO at different temperatures

The effect of tcmperattre on crystallite size and strain has also been investigated  . The crystall i tes are found to be highly anisotropic even at high temperatures

View Publication
Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
The problem and its manifestations with the modernists through the Iberissian systems in modern terminology (applied study): (Applied study)
...Show More Authors

Islamic law has relied on a number of sources in order to denote the rulings issued by them, including what is original and what is sub, and it is known to all scholars, that the Prophet's Sunnah is the second major source after the Koran, which separated the overall and devoted its year and restricted absolute. God Almighty obeyed the owner and his followers, and that his obedience of obedience to God Almighty said: (Who obeys the messenger has obeyed God) (women: 80), and then between the peasant who believes in him and his victory and follow him, he said: (and he said: And the one who was revealed with them were the successful ones (al-A'raf: 157).
     It is known that the Sunnah commanded to follow is the

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 18 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Remedy Efficiency through Paclitaxel on Rat (Rattus norvegicus) Brain Injury and Risk Premium of N- Diethyl nitrosamine (DEN) Injection
...Show More Authors

Abstract

The current study deals with the effect of N-Diethylnitrosamine (DEN) induced traumatic brain injury on male albino rats, as well as the outcome results of treatment with paclitaxel nanoparticles for a period of 8 weeks with two-week intervals is the concern of the present study. Mean body weight, as well as brain weight, was considered as the main parameters whereas a detailed immunohistochemical study on rat brain sections was performed. Astrocytic biomarkers for the diagnosis of astrocytes by fibrillary glial acidic protein (GFAP). Neuronal GFAP staining used for various broke sections were forwarded. Comparison and Contrast of all these parameters in all steps of the experiment had been discussed. The

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Russian Journal Of Bioorganic Chemistry
Synthesis and Study the Biological Activity of Some New Pyrazole Compounds Containing 1,3,4-Oxadiazole Unite Through Vilsmeier–Haack Reaction
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref