Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering
Prediction of the Effect of Using Stone Column in Clayey Soil on the Behavior of Circular Footing by ANN Model
...Show More Authors

Shallow foundations are usually used for structures with light to moderate loads where the soil underneath can carry them. In some cases, soil strength and/or other properties are not adequate and require improvement using one of the ground improvement techniques. Stone column is one of the common improvement techniques in which a column of stone is installed vertically in clayey soils. Stone columns are usually used to increase soil strength and to accelerate soil consolidation by acting as vertical drains. Many researches have been done to estimate the behavior of the improved soil. However, none of them considered the effect of stone column geometry on the behavior of the circular footing. In this research, finite ele

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Galaxy Morphological Image Classification using ResNet
...Show More Authors

     Machine learning-based techniques are used widely for the classification of images into various categories. The advancement of Convolutional Neural Network (CNN) affects the field of computer vision on a large scale. It has been applied to classify and localize objects in images. Among the fields of applications of CNN, it has been applied to understand huge unstructured astronomical data being collected every second. Galaxies have diverse and complex shapes and their morphology carries fundamental information about the whole universe. Studying these galaxies has been a tremendous task for the researchers around the world. Researchers have already applied some basic CNN models to predict the morphological classes

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Apr 22 2018
Journal Name
Acs Biomaterials Science & Engineering
Engineered coatings for titanium implants to present ultra-low doses of BMP-7
...Show More Authors

The ongoing research to improve the clinical outcome of titanium implants has resulted in the implementation of multiple approaches to deliver osteogenic growth factors accelerating and sustaining osseointegration. Here we show the presentation of human bone morphogenetic protein 7 (BMP-7) adsorbed to titanium discs coated with poly(ethyl acrylate) (PEA). We have previously shown that PEA promotes fibronectin organization into nanonetworks exposing integrin- and growth-factor-binding domains, allowing a synergistic interaction at the integrin/growth factor receptor level. Here, titanium discs were coated with PEA and fibronectin and then decorated with ng/mL doses of BMP-7. Human mesenchymal stem cells were used to investigate cellular resp

... Show More
View Publication Preview PDF
Scopus (43)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Jan 12 2016
Journal Name
Wireless Networks
Low communication cost (LCC) scheme for localizing mobile wireless sensor networks
...Show More Authors

In recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication

... Show More
View Publication
Scopus (34)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
The Broken Wings: The character of the Arab Christian |Woman in Sami Michael's Novel "Trumpet in the Wadi" versus "Jasmine" by Eli Amir: הכנפיים שנשברו דמות האישה הערבית הנוצרית ברומן " חוצוצרה בוואדי " של סמי מיכאל לעומת דמותה ב " יסמין " של אלי עמיר
...Show More Authors

Sami Michael and Eli Amir - two Israeli writers born in Iraq and of the same generation (Sami Makhail was born in Baghdad in 1926 and Eli Amir in 1937). They wrote in their novels, among other things, about Orientalism , love and femininity. They both lived wild, extroverted lives. They did not shy away from experiencing anything new that came their way, rebelled against conventions and acted provocatively; they enjoyed the shock and amazement that evoked around them. While trying to find their place in different family settings, they chose to present two Arab Christian heroines. The narrator in Jasmine is the speaker Noori-Eli himself. While the narrator of “Trumpet in the Wadi” is Huda the heroine herself. Both ar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
السرقات في المنظمات والعوامل المؤثرة فيها
...Show More Authors

Employee Stealing or internal theft is considered from the passive practices that can’t be denied or be hidden, In spite of the hospital privacy as a serving organization that works 24\7 and deleing with human lives, they weren’t infallible from that kind of practice. To prevent or reduce this practice, it was important to search for the organizational and behavioral factors influencing internal thefts.

   

   The study problem briefly is to reach the most organizational and behavioral factors influencing internal theft, in governmental hospitals in Baghdad Rusafa Health district, this was done by analyzing (20) administrative cases, of thefts occurred in the District, also a sample of (60) sp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
ابعاد الجودة في السيطرة على العدوى المكتسبة في المستشفيات الحكومية العراقية: دراسة تقويمية
...Show More Authors

ابعاد الجودة في السيطرة على العدوى المكتسبة في المستشفيات الحكومية العراقية: دراسة تقويمية

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 05 2014
Journal Name
Journal Of Educational And Psychological Researches
العملية – التعلمية في عصر الانترنت والصعوبات التي تعيق استعماله " دراسة اجريت على عينة من طالبات كلية التربية للبنات "
...Show More Authors

The study aims to introduce at the difficulties in which delay the using of the internet In the educational process – learning , Study was conducted on a sample of students in the College of Education for Girls and the effects of variables : possession of computer , availability of the internet service , and the level of parents on these difficulties ,  Used for this purpose, a total sample size (400) students, distributed Departments . Results showed that the most important difficulties in which delay using of internet were : Lack of knowledge of internet availability , Lack of knowledge of the aim of using this service , and the students satisfaction that the disadvantages is more than the advantages of

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 07 2012
Journal Name
Journal Of Educational And Psychological Researches
" التجديدات التربوية في العملية التعليمية "
...Show More Authors

Staring Of Its Philosophy And Intellectual  Orientations  And Ending With What Offering In Studying Rooms  {Educational System} Concerning  With Scientific ,Cognitive , Technological And Cultural Structures ,The Variables Inside This System  More Than Constants And Preoccupation With Future More Than Past And Present . 

So We Should Review  The Education System  Starting Of Its Philosophy Ending With Formulate  The Educational Structure According To A New Standers  To Estimate The Educational Outputs Within A Frame Of Behavioral Outputs  Relay On Global Quality Standards Influenced By Global Quality Culture Which Make Us Along The Educational And Cul

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 03 2016
Journal Name
Journal Of Educational And Psychological Researches
توظيف الشخصية في القصيدة الجديدة/ حميد سعيد انوذجا
...Show More Authors

This poem is regarded an important Harmonized structure in modern and Contemporary Culture to achieve aqualitative poem Comported with the other cultural structures inorder to discover the ego and aspiration in shaping distinctive voices.
The Iraqi poetry is affected tangibly by this poem because of the intellective vaccinating between Iraqi and Arab poets ingeneral and western cultures in particular as a result of the tranplahin movement and other important means.
The modern poet wood to ask some important characters to enrich his technician text inspite the fact that this is not a new way in Arab poetry but it takes avarant – criented to become outside the limits of rigid description within ongoing kinematic structure to be in

... Show More
View Publication Preview PDF