Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Swinburne University Of Technology
Numerical Modeling of Flow through Foam Nodes in the Presence of Solid Particles for Foams within the Dry Limit and for Foams that are Approaching the Wet Limit
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Feb 21 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of the push-out bond strength of root canal obturation materials filled by four different obturation techniques
...Show More Authors

Background: The aim of this study was to comparatively evaluate the push out bond strength (PBS) of root canal fillings using four different obturation techniques (single cone (SC), cold lateral compaction (CLC), continuous wave (CW), and carrier based gutta percha (CBG)). Materials and Methods: Forty mandibular premolar decoronated and instrumented with rotary ProTaper to F3 then teeth were divided randomly into 4 groups of 10 teeth for each as follow: group (I) single- cone obturation with matched-taper gutta-percha, group (II) cold lateral compaction technique, group (III) continuous wave of obturation technique, and group( IV) carrier based gutta-percha technique. Zinc oxide eugenol (ZOE) sealer was used as a root canal sealer for the

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Treatments with Graphic Techniques for the Scene in Theatrical Show (Applied study): عماد هادي عباس -محمود جباري حافظ
...Show More Authors

The current research studies the digital techniques in order to identify the treatments with graphic techniques for the theatrical scene, which includes a number of programs and treatment tools with digital technique to identify the visual and aesthetic dimensions and outputs achieved in the design of the theatrical scene in addition to the options, that they provide in the design of a system of hypotheses for the theatrical world, In order to be an experimental mediator in achieving the creative hypothesis, which limited the research with a pivotal objective which is: identifying the digital techniques employed in the graphic digital design for the scene in the theatrical show. The research lies in its objective limits stated in the met

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Comparative evaluation of the radiographic density of GuttaFlow® 2 in different obturation techniques using Spiral Computed Tomography
...Show More Authors

Background: Ideal root canal obturation depends on many factors; one of them is good sealing of root canal without pores. The aim of this study was to determine the radiographic density of GuttaFlow® 2 with different obturation techniques using spiral computed tomography. Materials and Methods: Forty palatal roots of permanent maxillary first molar were used in this study. Following working length determination, root canal was prepared using rotary PROTAPER universal system. They were randomly divided into four groups of 10 roots each, the groups are Conventional lateral condensation with Apexit Plus sealer, Conventional lateral condensation with GuttaFlow® 2 as a sealer, Soft Core Regular with GuttaFlow® 2 as a sealer and singl

... Show More
View Publication
Crossref
Publication Date
Tue Dec 11 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Contribution of Some Managerial Accounting Techniques to Achieve Market Share Requirements / Applied researchin the Al-Muthanna Cement Company
...Show More Authors

The research aims to achieve market share requirements and reach the targeted competitive price through the application of management accounting techniques represented by continuous improvement technique and target costing under an Activity Based Cost (ABC) system and Activity Based Management (ABM), In Muthanna Cement Company to reach the rationalization of the cost of the product and maintain the required quality and improve the profitability of the company.

The problem of research has emerged in the inability of local firms to enter into effective competition with other companies operating in the same economic sector, Because of the high cost of its products, Which led to the sale of the product at prices below its cost, and t

... Show More
View Publication
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
How geometric reverse engineering techniques can conserve our heritage; a case study in Iraq using 3D laser scanning
...Show More Authors
Abstract<p>Laser scanning has become a popular technique for the acquisition of digital models in the field of cultural heritage conservation and restoration nowadays. Many archaeological sites were lost, damaged, or faded, rather than being passed on to future generations due to many natural or human risks. It is still a challenge to accurately produce the digital and physical model of the missing regions or parts of our cultural heritage objects and restore damaged artefacts. The typical manual restoration can become a tedious and error-prone process; also can cause secondary damage to the relics. Therefore, in this paper, the automatic digital application process of 3D laser modelling of arte</p> ... Show More
View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Mar 01 2025
Journal Name
Iraqi Journal Of Physics
Design an Efficient Neural Network to Determine the Rate of Contamination in the Tigris River in Baghdad City
...Show More Authors

This article proposes a new technique for determining the rate of contamination. First, a generative adversarial neural network (ANN) parallel processing technique is constructed and trained using real and secret images. Then, after the model is stabilized, the real image is passed to the generator. Finally, the generator creates an image that is visually similar to the secret image, thus achieving the same effect as the secret image transmission. Experimental results show that this technique has a good effect on the security of secret information transmission and increases the capacity of information hiding. The metric signal of noise, a structural similarity index measure, was used to determine the success of colour image-hiding t

... Show More
View Publication
Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Use Of Artificial Neural Networks In Developing The Role Of Auditor In Discovering Fundamental Errors: An Applied Research In General Company for Electrical Industries and Nasr General Company for Mechanical Industries
...Show More Authors

Artificial neural networks usage, as a developed technique, increased in many fields such as Auditing business. Contemporary auditor should cope with the challenges of the technology evolution in the business environment by using computerized techniques such as Artificial neural networks, This research is the first work made in the field of modern techniques of the artificial neural networks in the field of auditing; it is made by using thesample of neural networks as a sample of the artificial multi-layer Back Propagation neural networks in the field of detecting fundamental mistakes of the financial statements when making auditing. The research objectives at offering a methodology for the application of theartificial neural networks wi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
Social Aspects in the Kingdom of Mali Through Ibn Battuta's book Tuhfat Alnuddar in Garaeb Al Amsar Wa Ajaeb Al Asfar
...Show More Authors

Social Aspects in the Kingdom of Mali Through Ibn Battuta's book Tuhfat   Alnuddar  in  Garaeb  Al Amsar  Wa  Ajaeb  Al  Asfar 

View Publication Preview PDF
Publication Date
Mon Dec 28 2020
Journal Name
Journal Of The College Of Education For Women
Expressing the Bewilderment of the Modern Man through Silence in Samuel Beckett’s Happy Days: بسعاد ماهر محيل, ومنذر عبد الرزاق سبع
...Show More Authors

Samuel Beckett’s Happy Days (1961) clearly portrays a lack of communication among the characters of the play which refers to the condition of modern man. This failure of communication led Samuel Beckett to use a lot of pauses and silences in all plays written instead of using words. To express the bewilderment of the modern man during the 20th century, Beckett adopts the use of no language strategy in the dramatic works. After World War II, people were without hope, religion, food, jobs, homes, or even countries. Beckett gave them a voice. He used a dramatic language out of everyday things, in which silence was part of the syntax as a poetic repetition. Language is no more important to the modern man; instead, he us

... Show More
View Publication Preview PDF
Crossref