Preferred Language
Articles
/
ijs-273
Hide Secret Messages in Raster Images for Transmission to Satellites using a 2-D Wavelet Packet
...Show More Authors

     The hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compression of the stego-image raster in L2 and L3 using a 2-D wavelet packet. The outcome is a highly efficient algorithm, which can rapidly conceal information inside transmitted satellite images, thus guarding against revealing information to potential cyber-attackers.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
Propose retina identification system based on the combination of SURF detector and BRISK descriptor
...Show More Authors

     In this paper the design of hybrid retina matching algorithm that is used in identification systems is considered. Retina based recognition is apparent as the most secure method for identification of an identity utilized to differentiate persons.

     The characteristics of Speeded up Robust Feature (SURF) and Binary Robust Invariant Scalable Key-Points (BRISK) algorithm have been used in order to produce a fast matching algorithm than the classical ones, those characteristics are important for real-time applications which usually need quick processing of a growing quantity of data. The algorithm is divided into three stages: retinal image processing and segmentation, extracting the lo

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
FLOW INJECTION ANALYSIS AND SPECTROPHOTOMETRIC DETERMINATION OF NIFEDIPINEIN PHARMACEUTICAL FORMULATION: FLOW INJECTION ANALYSIS AND SPECTROPHOTOMETRIC DETERMINATION OF NIFEDIPINEIN PHARMACEUTICAL FORMULATION
...Show More Authors

A new simple and sensitive spectrophotometric method is described for quantification of Nifedipine (NIF) and their pharmaceutical formulation. The selective method was performed by the reduction of NIF nitro group to yield primary amino group using zinc powder with hydrochloric acid. The produced aromatic amine was submitted to oxidative coupling reaction with pyrocatechol and ammonium ceric nitrate to form orange color product measured spectrophotometrically with maximum absorption at 467nm. The product was determined through flow injection analysis (FIA) system and all the chemical and physical parameters were optimized. The concentration range from 5.0 to 140.0 μg.mL-1 was obeyed Beer’s law with a limit of detection and quantitatio

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Performance Comparison of Transport Layer Protocols
...Show More Authors

Transport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.

View Publication
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Performance Evaluation of IPv6 Header Compression over MPLS via Satellite
...Show More Authors

Broadband satellite is playing a main role in provision global coverage and onboard processing ability over IP networks to assess user applications. In order to lower the cost, get better security, solve IPv4 addressing limitation, expand the expected advantages of modern routing and mobility characteristics; the next-generation satellite systems ought to support IPv6 and seamlessly incorporate with terrestrial networks including wireless local loops. Satellite communication links have a number of limitations compared to terrestrial communications networks such as large delay and high header overhead for IPv6 consumes the bandwidth and causes lower transmission effectiveness; however, the quality of service (QoS) (such as delay, jitter,

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Synthesis, characterization and biological evaluation of thiazolyl azo ligand complexes with some metal ions.
...Show More Authors

(E)-2-(benzo[d]thiazol-2-yliazenyl)-4-methoxyaniline was synthesized by reaction the diazonium salt of 2-aminobenzothiazole with 4-methoxyaniline. Identified of the ligand by spectral techniques (UV-Vis, FTIR,1HNMR and LC-Mass) and microelemental analysis (C.H.N.S.O) are used to produce of the azo ligand. Complexes of (Co2+, Ni2+, Cu2+ and Zn2+) were synthesized and identified using atomic absorption of flame, elemental analysis, infrared and UV-Vis spectral process as well conductivity and magnetic quantifications. Nature of compounds produced have been studied followed the mole ratio and continuous contrast methods, Beer's law followed during a concentration scope (1×10-4-3×10-4 mole/L). height molar absorptivity of compound solutions h

... Show More
Publication Date
Fri Jun 28 2024
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Synthesis, Characterization, Molecular Docking, ADMET Study, and Antimicrobial Evaluation of New Mannich Bases of Isatin–Thiazole Imine Bases
...Show More Authors

Background: The isatin molecule is present in many natural substances, including plants and animals, and is used to prepare compounds with various biological activities. Objectives: To synthesize a new series of isatin derivatives with the expectation that they will have antimicrobial activity. Methods: Thiazole Schiff bases were synthesized from various Mannich bases of isatin to evaluate their antimicrobial properties. Initially, Mannich bases (2a–e) were synthesized by reacting isatin with formaldehyde and different secondary amines. Subsequently, they were treated with 2-aminothiazole to yield the final compounds (3a–e). Spectroscopic characterization was done via FT-IR and 1H-NMR. The antimicrobial screening was conducted o

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Effect of Water on Some Mechanical Properties of Epoxy Blends Reinforced With Different Weight Fractions of Nano Titanium Oxide and Nano Silica
...Show More Authors

Polymer composites were prepared using epoxy resin (EP) and unsaturated polyester (UPE) as a blend matrices, which were mixed together in different percentages (starting from 90:10) of (epoxy/polyester) respectively, and ending with (50:50) of (epoxy/polyester). The optimum mixing ratio (OMR) of the components was decided upon the results of the impact strength value of these blending ratio, which showed the highest value of (16.3) KJ/m2 for the blending ratio (80:20) of (EP/UPE) respectively.
The blend with (OMR) was chosen to be reinforced with three different weight fractions of reinforcement; the 1st one was reinforced with nano titanium oxide (TiO2) with a weight fraction (2% wt.), the 2nd one was reinforced with both nano (TiO2)

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of The College Of Languages (jcl)
An Analytical Study of Viewpoint in Parsi Pour's and Ar-Rikabi's Novels: The Dog and the Long Night and Alibaba's Sad Night as Examples: بررسی تحليلی زاویه¬ی دید در رمان¬های پارسی پور و الرکابی باتكيه بر رمان "سگ و زمستان بلند" و "ليل علی بابا الحزین"
...Show More Authors

It is noted in the title that the paper studies the viewpoint in the novel The Dog and the Long Night by the Iranian novelist Shahranoush Parsi Pour and in the novel Alibaba's Sad Night by the Iraqi novelist Abdulkhaliq Ar-Rikabi. Both are well known novelists, and about whose stories and novels many critical books, MA theses, and Ph.D. dissertations have been written. Also, some of their literary works have won prizes. Here, the researcher shed light on the concept of viewpoint, its types, and its importance in novels in general. This was done along with tackling the two viewpoints in both novels, where similarities and differences were identified. For this end, the researcher has adopted the analytic-descriptive appro

... Show More
View Publication Preview PDF
Crossref (1)
Crossref