Preferred Language
Articles
/
gxbpvYoBVTCNdQwCoKQX
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using three different keys to make the system harder to break by outsider attackers (where the 1stand 3rdencryptions keys are numerical keys, while the 2ndkey is string). This system is done based on seven steps; the first step is converting the plaintext based on the first generated key that leads to substitute each character in plaintext, the second step is embedding second generated key with the message that want to send, the third step is done by converting text to their equivalent ASCII format. The fourth step is converting these ASCII format to Binary numbers; then, these numbers are shifted based on the third generated key. These binary numbers are converted to ASCII, and the last step is to convert ASCII to their equivalent characters. The achieved text is the ciphertext that will be sent.

Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Effect of Gamma Irradiation on Vegetative Growth of three Sugarcane Genotypes (Saccharum officinarum L.) in field
...Show More Authors

I n vitro rooting plantlets of three sugarcane genotypes(Co.j.64, Co.j.86 and Missan) were cultured in the field after exposed at different doses of gamma rays (1,2,3,4,) kr. Data of reduction percentage on vegetative growth, roots number, length per plant and their diameter were investigated. Results showed gradual reductions in number of shoots, length and diameter as according to increasing of gamma doses. The reduction percentage in shoot number, length were reached 57.86,70.36 % at 4 kr respectively which have mean number and length per plant reached (9.27 and 55.33 cm) as compared with the control treatment ,While 1 kr caused higher percent in diameter reached 9.69 % with mean of diameter per plant reached 2.57 cm. Mean time , Ge

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2015
Journal Name
Ama, Agricultural Mechanization In Asia, Africa And Latin America
Effect of three honeycomb interplant distances on yield and it components of two cultivars of bean
...Show More Authors

A factorial experiment (2× 3) in randomized complete block design (RCBD) with three replications was conducted to examine the effect of honeycomb selection method using three interplant distances on yield and its components of two cultivars of bean, Bronco and Strike. Interplant distances used were 75× 65 cm, 90× 78 cm, and 105× 91 cm (row× plant) represent short (high plant density), intermediate (intermediate plant density), and wide (low plant density) distance, respectively. Parameters used for selection were number of days from planting to the initiation of first flower, number of nodes formed prior to first flower, and number of main branches. Results showed significant superiority of the Bronco cultivar represented in the number

... Show More
Scopus
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
Social solidarity in religions        Three / critical study
...Show More Authors

The researcher wanted to make an attempt to identify the foundations of social solidarity, to strengthen the bonds of brotherhood among society, and spread the causes of compassion in the hearts of its members.
       The researcher has taken a short course in the hearts of the beloved to hearts.

View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Research on Emotion Classification Based on Multi-modal Fusion
...Show More Authors

Nowadays, people's expression on the Internet is no longer limited to text, especially with the rise of the short video boom, leading to the emergence of a large number of modal data such as text, pictures, audio, and video. Compared to single mode data ,the multi-modal data always contains massive information. The mining process of multi-modal information can help computers to better understand human emotional characteristics. However, because the multi-modal data show obvious dynamic time series features, it is necessary to solve the dynamic correlation problem within a single mode and between different modes in the same application scene during the fusion process. To solve this problem, in this paper, a feature extraction framework of

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Oct 14 2016
Journal Name
Functional Pavement Design
Effect of different variables on asphalt mechanical properties
...Show More Authors

Permanent deformation (rutting) of asphalt mixtures is one of the major forms of distress. Aggregate gradation is one of the most important factors affecting the permanent deformation of asphalt mixtures. Other variables are also important to understand their effects on the mixture such as temperature, binder content and compaction level. For this purpose 6 different aggregate gradations have been chosen and each one of them has been manufactured / tested with different variables. The results showed that at relatively low temperature there is little effect of aggregate packing on the permanent deformation. However, as the temperature increases the effect of gradation becomes apparent, in that the better the packing the better the resistance

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Red flour beetle survival on different food items
...Show More Authors

Studied red beetle life on each of the yen and wheat durum wheat, barley, corn, rice, chickpeas, ground peanuts and beans in Living situation constant temperature and relative humidity of 65% for a period of 66 days was the life cycle of the insect different from one substance to another ....

View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Aware of the roots of the text in the arab heritage
...Show More Authors

Text science presented a set of criteria to make the text essentially a project to create
texts and use. Me and means of cohesion script text scientists, two standard foundries and
knitting. Find this means their equivalent in the Arab rhetorical Heritage has been found, it
means foundries find Accompanying represented (link grammar in the classroom and link),
and referrals represented by (Baldmair, Ldefinition, and the name of the signal), and
deletion, and repetition, and presentation delays. As in the standard knitting it has confirmed
Albulagjun Arabs on the semantic consistency between the text components, as reflected in
the moral link in Chapter interfaces, as well as in moral coherence between parts of the te

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref