Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
Time in (what and whatever) conditionals
...Show More Authors

This is a research in which I studied the opinions of Arab scholars, in their studies
For (what) and (whatever) the two conditionals and their indication of time, and its name
B (time in (what) and (whatever) the two conditions), and I mentioned their opinions in it
This issue was discussed and discussed, and in this study it relied on the sources of the Arabic language.
Especially the books of grammar, interpretation, and the opinions of the scholars of the principles of jurisprudence are mentioned,
I also mentioned the opinion of the scholars of jurisprudence, and how they likened (whatever) to (everything).
In its indication of repetition, and as long as it indicates repetition, it indicates
time Because repetitio

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
Lexical Bundles: Identification and Distinguishing Features
...Show More Authors

It is not often  easy to identify a certain group of words as a lexical bundle, since the same set of words can be, in different situations, recognized as idiom,  a collocation, a lexical phrase or a lexical bundle. That is, there are many cases where the overlap among the four types is plausible. Thus, it is important to extract the most identifiable and distinguishable characteristics with which a certain group of words, under certain conditions, can be recognized as a lexical bundle, and this is the task of this paper.

View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Physics: Conference Series
Generalized Rough Digraphs and Related Topologies
...Show More Authors
Abstract<p>The primary objective of this paper, is to introduce eight types of topologies on a finite digraphs and state the implication between these topologies. Also we used supra open digraphs to introduce a new types for approximation rough digraphs.</p>
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Nov 11 2015
Journal Name
Thesis
St-Closed and Semi-extending Modules
...Show More Authors

Let R be a commutative ring with identity 1 ¹ 0, and let M be a unitary left module over R. A submodule N of an R-module M is called essential, if whenever N ⋂ L = (0), then L = (0) for every submodule L of M. In this case, we write N ≤e M. An R-module M is called extending, if every submodule of M is an essential in a direct summand of M. A submodule N of an R-module M is called semi-essential (denoted by N ≤sem M), if N ∩ P ≠ (0) for each nonzero prime submodule P of M. The main purpose of this work is to determine and study two new concepts (up to our knowledge) which are St-closed submodules and semi-extending modules. St-closed submodules is contained properly in the class of closed submodules, where a submodule N of

... Show More
Publication Date
Wed Feb 04 2004
Journal Name
5th Scientific Conference Of Engineering College In University Of Baghdad, 25th -27th Of February, Baghdad, Iraq
Technology and lighting in interior Design.
...Show More Authors

Publication Date
Mon Jul 01 2024
Journal Name
International Journal Of Engineering In Computer Science
Human biometric identification: Application and evaluation
...Show More Authors

View Publication
Crossref
Publication Date
Tue Aug 23 2022
Journal Name
International Journal Of Health Sciences
Synthesis and characterization of methotrexate nanoparticals
...Show More Authors

The MTX was converted to MTX nanoparticles by the modified method based on changing the pH gradually with exposure to ultrasound and shaking , changing the pH with exposure to ultrasound plays an significant role in the formation of nanoparticles, and this is shown in some previous studies. As the change in pH affects the nature of bonding between molecules, as well as the strength of bonding that depends on the change of electrical charges The exposure to ultrasound waves will greatly affect the breakdown of large particles into small particles that reach the level of nanoparticles. The MTX NPs formation was characterized by UV-Vis spectra analysis , Atomic force microscopy (AFM) analysis, Scanning electron microscope (SEM) and Fou

... Show More
View Publication
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Babis and Baha’is in Iran
...Show More Authors

The person who wants to learn. The history of Bab’is will notice a very
starnge phenomenon that they (Babis and Baha’is) resort to visions to prove their
delusion.
The believers usually reach to each other by their visions. This phenomenon
are shared among them from Al- Ahsa’ai time till the last phase of their propaganda
which is the Baha’is propaganda, and this is due to their ignorance and under
development in doctrine of islam which was widespread in Iran and the Islamic world.
The whole secrets of Babis and Baha’is movement were restricted among
particular group, most of them were Al- Rashti’s students and knew the basic
principles of their movement which deperding or (the principles) declarati

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 03 2004
Journal Name
Journal Of Engineering
Heritage and Art Creativity in architecture
...Show More Authors

Publication Date
Thu Dec 30 2021
Journal Name
Al-kindy College Medical Journal
Melatonin in male and female fertility
...Show More Authors

Melatonin, a hormone synthesized mainly by the pineal gland, has been found in extra-pineal organs as well. It’s known as an organizer of circadian rhythms and more recently as an anti-oxidant. In addition to its role in maintaining immunity, pathophysiology of cardiovascular and neurological diseases, and as an anti-cancer agent, evidence has demonstrated that melatonin exerts a positive impact on male and female fertility primarily through oxygen scavenging effects. In In Vitro Fertilization (IVF) programs, supplementation of melatonin may be associated with better outcomes in terms of sperm quality, oocyte quality, embryo quality and pregnancy rates. This review summarizes various actions of melatonin on the body focusing on ma

... Show More
View Publication Preview PDF
Crossref