Preferred Language
Articles
/
gxbpvYoBVTCNdQwCoKQX
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using three different keys to make the system harder to break by outsider attackers (where the 1stand 3rdencryptions keys are numerical keys, while the 2ndkey is string). This system is done based on seven steps; the first step is converting the plaintext based on the first generated key that leads to substitute each character in plaintext, the second step is embedding second generated key with the message that want to send, the third step is done by converting text to their equivalent ASCII format. The fourth step is converting these ASCII format to Binary numbers; then, these numbers are shifted based on the third generated key. These binary numbers are converted to ASCII, and the last step is to convert ASCII to their equivalent characters. The achieved text is the ciphertext that will be sent.

Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Oct 14 2016
Journal Name
Functional Pavement Design
Effect of different variables on asphalt mechanical properties
...Show More Authors

Permanent deformation (rutting) of asphalt mixtures is one of the major forms of distress. Aggregate gradation is one of the most important factors affecting the permanent deformation of asphalt mixtures. Other variables are also important to understand their effects on the mixture such as temperature, binder content and compaction level. For this purpose 6 different aggregate gradations have been chosen and each one of them has been manufactured / tested with different variables. The results showed that at relatively low temperature there is little effect of aggregate packing on the permanent deformation. However, as the temperature increases the effect of gradation becomes apparent, in that the better the packing the better the resistance

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Red flour beetle survival on different food items
...Show More Authors

Studied red beetle life on each of the yen and wheat durum wheat, barley, corn, rice, chickpeas, ground peanuts and beans in Living situation constant temperature and relative humidity of 65% for a period of 66 days was the life cycle of the insect different from one substance to another ....

View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Sat Feb 15 2025
Journal Name
Iraqi Journal Of Science
Effect of Aluminum Dust Particles on Plasma Parameters at Different Gas Pressure with Different Dust Contents
...Show More Authors

In this work, the effect of aluminum (Al) dust particles on the DC discharge plasma properties in argon was investigated. A magnetron is placed behind the cathode at different pressures and with varying amounts of Al. The plasma temperature (Te) and density (ne) were calculated using the Boltzmann equation and Stark broadening phenomena, which are considered the most important plasma variables through which the other plasma parameters were calculated. The measurements showed that the emission intensity decreases with increasing pressure from 0.06 to 0.4 Torr, and it slightly decreases with the addition of the NPs. The calculations showed that the ne increased and Te decreased with pressure. Both Te and ne were reduced by increasing

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Research on Emotion Classification Based on Multi-modal Fusion
...Show More Authors

Nowadays, people's expression on the Internet is no longer limited to text, especially with the rise of the short video boom, leading to the emergence of a large number of modal data such as text, pictures, audio, and video. Compared to single mode data ,the multi-modal data always contains massive information. The mining process of multi-modal information can help computers to better understand human emotional characteristics. However, because the multi-modal data show obvious dynamic time series features, it is necessary to solve the dynamic correlation problem within a single mode and between different modes in the same application scene during the fusion process. To solve this problem, in this paper, a feature extraction framework of

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Effect of Gamma Irradiation on Vegetative Growth of three Sugarcane Genotypes (Saccharum officinarum L.) in field
...Show More Authors

I n vitro rooting plantlets of three sugarcane genotypes(Co.j.64, Co.j.86 and Missan) were cultured in the field after exposed at different doses of gamma rays (1,2,3,4,) kr. Data of reduction percentage on vegetative growth, roots number, length per plant and their diameter were investigated. Results showed gradual reductions in number of shoots, length and diameter as according to increasing of gamma doses. The reduction percentage in shoot number, length were reached 57.86,70.36 % at 4 kr respectively which have mean number and length per plant reached (9.27 and 55.33 cm) as compared with the control treatment ,While 1 kr caused higher percent in diameter reached 9.69 % with mean of diameter per plant reached 2.57 cm. Mean time , Ge

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2015
Journal Name
Ama, Agricultural Mechanization In Asia, Africa And Latin America
Effect of three honeycomb interplant distances on yield and it components of two cultivars of bean
...Show More Authors

A factorial experiment (2× 3) in randomized complete block design (RCBD) with three replications was conducted to examine the effect of honeycomb selection method using three interplant distances on yield and its components of two cultivars of bean, Bronco and Strike. Interplant distances used were 75× 65 cm, 90× 78 cm, and 105× 91 cm (row× plant) represent short (high plant density), intermediate (intermediate plant density), and wide (low plant density) distance, respectively. Parameters used for selection were number of days from planting to the initiation of first flower, number of nodes formed prior to first flower, and number of main branches. Results showed significant superiority of the Bronco cultivar represented in the number

... Show More
Scopus
Publication Date
Fri Jan 01 2016
Journal Name
Machine Learning And Data Mining In Pattern Recognition
A New Strategy for Case-Based Reasoning Retrieval Using Classification Based on Association
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
Social solidarity in religions        Three / critical study
...Show More Authors

The researcher wanted to make an attempt to identify the foundations of social solidarity, to strengthen the bonds of brotherhood among society, and spread the causes of compassion in the hearts of its members.
       The researcher has taken a short course in the hearts of the beloved to hearts.

View Publication Preview PDF