Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Aesthetic and expressive characteristics in the works of Jean Dubuffet
...Show More Authors

The research presented the tagged (aesthetic and expressive characteristics in the works of Jean Dubuffet), so the research objective was: to know the aesthetic and expressive characteristics in the works of (Jean Dubuffet), and the research included four chapters. The aim of the research, the limits of the research, and the definition of terms. The second chapter included four topics. The first topic presented the aesthetic essence and style, while the second topic dealt with expressionism: approaches in concept and meaning.
While the third topic was preoccupied with presenting the aesthetic and expressiveness in the drawings of modernity and beyond, while the fourth topic dealt with: Jean Dubuffet and the experience of raw art. Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
Guernica Semiotics… methods of Expression between Aesthetic and Semantic Composition
...Show More Authors

This semiotic analytical study has shown that there is a wide diversity in the aesthetic systems and the ranges of reception for the rhetoric and the discourse. The fertility of this semiotic conceptual system monitored this new mature, innovative and advanced level of this new critical analytical method with its different technical and theoretical foundations. Thus, it opened the door wide to new discoveries in the laws, which motivate different artistic texts. Finally, the research is just a start. Can the linguistic methods read the artistic works outside the linguistic authorities? Is it possible to capture the structural transformation in Picasso drawings? Semiotically another researcher in another method (such as deconstruction) ca

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 14 2023
Journal Name
Aip Conference Proceedings
Seismic impact on makhool earthdam in flood and drought seasons
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Nov 02 2022
Journal Name
Res Militaris
Cultural Activities The Iraqi Ministry of Culture, Tourism and Antiquilies
...Show More Authors

It’s an attempt to identify the cultural activities of the Ministry of Culture, Tourism and Antiquities, which are provided by the Ministry of Culture, Tourism and Antiquities and the departments affiliated with the Ministry of Culture only, not tourism and antiquities. The most important results areIs that the Ministry of Culture, Tourism and Antiquities has many cultural activities such as (festivals, exhibitions, conferences, fashion shows, concerts, musical evenings, theatrical and cinematic performances) in addition to literary series and cultural magazines, which are directed to the public in general, whether it is elite or not, and this shows the extent The importance of cultural activities published by the Ministry of Culture, Tou

... Show More
Preview PDF
Publication Date
Thu Aug 01 2024
Journal Name
Electronics
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex

... Show More
View Publication
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Feb 01 2025
Journal Name
مجلة واسط للعلوم الانسانية
Exploring Cultural and Personal Trauma in Heather Raffo’s Play Noura
...Show More Authors

  The paper delves into the examination of trauma portrayals in Heather Raffo's “Noura” (2019). Raffo examines the challenges faced by two Iraqi women, Raffo and Maryam, in relation to parenthood following the capture of Iraq by “ISIS”. The paper is concerned with the various depictions of trauma that Raffo accomplishes in the text then delves in the way she cocooned her characters’ identity in order to recover their traumas. Initially, Noura is a trauma tale, illustrating the recurrent and repetitive nature of trauma from mother to daughter. The narrative reflects the interactions and dynamics between the mother and daughter and their function as substitutes for memory and recounting personal narratives. Moreover, examin

... Show More
View Publication
Crossref
Publication Date
Fri Dec 20 2024
Journal Name
Al-qadisiyah Journal Of Pure Science
Weakly and Strongly Forms of Fibrewise Fuzzy ω--Topological Spaces
...Show More Authors

Abstract This paper is devoted to introduce weak and strong forms of fibrewise fuzzy u-topological spaces, namely the fibrewise fuzzy q-u-topological spaces, weakly fibrewise fuzzy q-u-topological spaces and strongly fibrewise fuzzy q-utopological spaces. Also, Several characterizations and properties of this class are also given as well. Finally, we focused on studying the relationship between weakly fibrewise fuzzy q-u-topological spaces and strongly fibrewise fuzzy q-utopological spaces.

View Publication Preview PDF
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Experimental and Numerical Study on Cavitation Effects in Centrifugal Pumps
...Show More Authors

Experimental and numerical investigations of the centrifugal pump performance at non-cavitating and cavitating flow conditions were carried out in the present study. Experiments were performed by applying a vacuum to a closed-loop system to investigate the effects of the net positive suction head available (NPSHa), flow rate, water temperature and pump speed on the centrifugal pump performance. Accordingly, many of the important parameters concerning cavitation phenomenon were calculated. Also, the noise which is accompanied by cavitation was measured. Numerical analysis was implemented for two phase flow (the water and its vapor) using a 2-D simulation by ANSYS FLUENT software to investigate the internal flow of centrifugal pump under c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Computer Science Issues (ijcsi)
Near Rough and Near Exact Subgraphs in Gm-Closure spaces
...Show More Authors

The basic concepts of some near open subgraphs, near rough, near exact and near fuzzy graphs are introduced and sufficiently illustrated. The Gm-closure space induced by closure operators is used to generalize the basic rough graph concepts. We introduce the near exactness and near roughness by applying the near concepts to make more accuracy for definability of graphs. We give a new definition for a membership function to find near interior, near boundary and near exterior vertices. Moreover, proved results, examples and counter examples are provided. The Gm-closure structure which suggested in this paper opens up the way for applying rich amount of topological facts and methods in the process of granular computing.

Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Practice Periodical On Structural Design And Construction
Best Practice Strategies for Workforce Development and Sustainability in Construction
...Show More Authors

View Publication
Scopus (15)
Crossref (16)
Scopus Clarivate Crossref