Preferred Language
Articles
/
ijs-273
Hide Secret Messages in Raster Images for Transmission to Satellites using a 2-D Wavelet Packet
...Show More Authors

     The hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compression of the stego-image raster in L2 and L3 using a 2-D wavelet packet. The outcome is a highly efficient algorithm, which can rapidly conceal information inside transmitted satellite images, thus guarding against revealing information to potential cyber-attackers.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 14 2011
Journal Name
Journal Of Education
Synthesis and Characterization Complexes of 2- Thiotolylurea with Matel Salts.
...Show More Authors

Complexes of some metal ions with 2-thiotolylurea were prepared in ethanolic medium using (1:1) (Metal : Ligand) ratio yielded series of neutral complexes as the general formula [M(L)Cl2]. The prepared complexes were identified by atomic absorption FT.IR, UV-Visble spectra, molar conductivity and magnetic properties. From the above data the tetrahedral structure was suggested for all complexes.

Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preliminary Cytotoxic Study of Some Novel Furo-2-quinolone Compounds
...Show More Authors

In this research, new series of Furo-2-quinolone [FQ] compounds have been synthesized. These novel [FQ] compounds were prepared from coumarin derivatives (Furocoumarins: psoralen and isopsoralen).Identifications of these FQ compounds were performed by using infrared spectrum (I.R), Ultraviolet spectrum (U.V) and Nuclear Magnetic Resonance spectrum (H1-NMR) besides some physical data. The cytotoxic screening involves ;using HEP-2 cell line which gave differential responses against tested compounds : 4,6 Dimethyl furo[2, 3-g] coumarin (C1), 1-(2`, 4`, Dimethoxy benzylideneimino)-2,6-dimethyl Furo [2, 3-g] quinoline-2-one (C3) and the angular psoralen of the same derivative

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jun 03 2023
Journal Name
Iraqi Journal Of Science
Synthesis and Characterization of Some New Derivatives From 2-Mercaptobenzoxazole
...Show More Authors

In this work 2-mercaptobenzoxazole (2-MBO) (1), was prepared by using homemade Auto clave .The synthesis involve treatment of 2-MBO with 2-chloro acetyl chloride to give 2-chloroacetyl thio benzoxazole (2), the product was treated with phenyl hydrazine to give 2-phenyl hydrazide acetyl thio benzoxazole (3). The new derivatives (4-13) were synthesized by reaction of 2-phenyl hydrazide acetyl thio benzoxazole (3) with different aromatic aldehydes in the presence of acetic acid. The compound (2) was treated with hydrazine hydrate to give product (14) then treated with different aromatic aldehydes in the presence of glacial acetic acid to give Schiff bases derivatives (15-24). Structure of all the prepared compounds confirmation were proved

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Synthesis of Some Heterocyclic Compounds Derived from 2-Mercapto Benzoxazole
...Show More Authors

New series of 2-mecapto benzoxazole derivatives (1-20) incorporated into fused to different nitrogen and suphur containing heterocyclic were prepared from 2-meracpto benzoxazole, when treated with hydrazine hydrate to afford 2-hydrazino benzoxazol (1). Compound (1) converted to a variety of pyridazinone andphthalazinone derivatives (2-4) by reaction with different carboxylic anhydride. Also, reaction of (1) with phenyl isothiocyanate and ethyl chloro acetate afforded 3-phenyl-1,3-thiazolidin-2,4-dione-2-(benzoxazole-2-yl-hydrazone) (6). Azomethines (7-10) were prepared through reaction of (1) with aromatic aldehyde, then (7, 8) converted to thaizolidinone derivatives (11, 12). Treatment of (1) with active methylene compounds afforded deriva

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis of some 1,3-diazepine -4,7-diones derivatives (part 2)
...Show More Authors

1,3-0xazepine-4)-diones were  prepared by c.ondensation of N­

cinnamylideneareneamines with maleic anhydride,  phthalic;; anhydride

,and  3-nitrophthalic  anhydride.  The  oxazepjne::; were  reacted  with

primary aromatic  amine  to give the corresponding  1 ,3--diazepine-4,7- diones.

View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Hard-soft interacation of 2-mercaptobenzonathol with some metal ions
...Show More Authors

Was appointed acid steady disintegration of organic EkandThe results proved that organic Allicand acting and Konnh solid baseBy Tgrav Pearson has possible account Maamat hardness and softness of organic Ekand

View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
A comparison Some of Methods for Estimating Survival Function for Truncated Exponential Distribution
...Show More Authors

Exponential distribution is one of most common distributions in studies and scientific researches with wide application in the fields of reliability, engineering and in analyzing survival function therefore the researcher has carried on extended studies in the characteristics of this distribution.

In this research, estimation of survival function for truncated exponential distribution in the maximum likelihood  methods and Bayes first and second method, least square method and Jackknife dependent in the first place on the maximum likelihood method, then on Bayes first method then comparing then using simulation, thus to accomplish this task, different size samples have been adopted by the searcher us

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
A Mathematical Model of a Thermally Activated Roof (TAR) Cooling System Using a Simplified RC-Thermal Model with Time Dependent Supply Water Temperature
...Show More Authors

This paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
A Secure Private Key Recovery Based on DNA Bio-Cryptography for Blockchain
...Show More Authors

     The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Oct 19 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
The effect of using the interactive video accompanying the static training in learning some basic skills of a model school in squash
...Show More Authors

Lately great interests have emerged to find educational alternatives to teach and improve motor skills according to modern educational methods that take into account individual differences and speed in learning for the learner through individual learning that the learner adopts by teaching himself by passing through various educational situations to acquire skills and information in the way he is The learner is the focus of the educational process and among these alternatives the interactive video, the researchers noted through the educational training units at the Model Squash School of the Central Union, and that most of the methods and methods used in learning basic skills take a lot of time in the educational program and do not involve

... Show More
View Publication Preview PDF