Preferred Language
Articles
/
ijs-675
Secret-Word by e-Abacus Diagram I

This experiment may be applied before with certain and special roles, but never applied under partition theory (Abacus James Diagram) conditions. Therefore, we would have to find an appropriate design for each character to enable us sending a word represented as increasing number with meaning only for beneficiaries.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
The Secret Reasons for the Western Scholars Studies The Biography of the prophet

Western Scholars have criticized al the material on the point of reliability . Some have taken the unduly Sceptical view that nothing is to be trusted except Quran . The present study is based on opposing view that at least the material in the early biographers is to be accepted as true , except where there are particular reasons for thinking that an anecdote has been distorted ( or invented ) through legal or political motives. It is also assumed that most of the background material culled from a large number of vaired works , is sound . This standpoint .I would claim , leads to a coherent view of Muhammad's life and achievement.

View Publication Preview PDF
Publication Date
Tue May 01 2012
Journal Name
Iraqi Journal Of Physics
Studying the optical properties of ( Cr2O3:I ) thin films prepared by spray pyrolysis technique

Undoped and Iodine (I)–doped chrome oxide (Cr2O3)thin films have been prepared by chemical spray pyrolysis technique at substrate temperatures(773K) on glass substrate. Absorbance and transmittance spectra have been recorded as a function of wavelength in the range (340-800 nm) in order to study the optical properties such as reflectance, Energy gap of allowed direct transition, extinction coefficient refractive index, and dielectric constant in real and imagery parts all as a function of wavelength. It was found that all the investigated parameters affect by the doping ratios.

View Publication Preview PDF
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Integral Transforms of New Subclass of Meromorphic Univalent Functions Defined by Linear Operator I

    New class A^* (a,c,k,β,α,γ,μ)  is introduced of meromorphic univalent functions with positive coefficient f(z)=â–¡(1/z)+∑_(n=1)^∞▒〖a_n z^n 〗,(a_n≥0,z∈U^*,∀ n∈ N={1,2,3,…}) defined by the integral operator in the punctured unit disc U^*={z∈C∶0<|z|<1}, satisfying |(z^2 (I^k (L^* (a,c)f(z)))^''+2z(I^k (L^* (a,c)f(z)))^')/(βz(I^k (L^* (a,c)f(z)))^''-α(1+γ)z(I^k (L^* (a,c)f(z)))^' )|<μ,(0<μ≤1,0≤α,γ<1,0<β≤1/2 ,k=1,2,3,… ) . Several properties were studied like coefficient estimates, convex set and weighted mean.

Crossref
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
e*-Extending Modules

     This paper aims to introduce the concepts of  -closed, -coclosed, and -extending modules as generalizations of the closed, coclossed, and extending modules,  respectively. We will prove some properties as when the image of the e*-closed submodule is also e*-closed and when the submodule of the e*-extending module is e*-extending. Under isomorphism, the e*-extending modules are closed. We will study the quotient of e*-closed and e*-extending, the direct sum of e*-closed, and the direct sum of e*-extending.

Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
European Journal Of Pure And Applied Mathematics
Publication Date
Thu Nov 02 2023
Journal Name
Missouri Journal Of Mathematical Sciences
Publication Date
Thu Jan 24 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
On strongly E-convex sets and strongly E-convex cone sets

              -convex sets and -convex functions, which are considered as an important class of generalized convex sets and convex functions, have been introduced and studied by Youness [5] and other researchers. This class has recently extended, by Youness, to strongly -convex sets and strongly -convex functions. In these generalized classes, the definitions of the classical convex sets and convex functions are relaxed and introduced with respect to a mapping . In this paper, new properties of strongly -convex sets are presented. We define strongly -convex hull, strongly -convex cone, and strongly -convex cone hull and we proof some of their properties.  Some examples to illustrate the aforementioned concepts and to cl

... Show More
Crossref
View Publication
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Sentiment Analysis on Roman Urdu Students’ Feedback Using Enhanced Word Embedding Technique

 

Students’ feedback is crucial for educational institutions to assess the performance of their teachers, most opinions are expressed in their native language, especially for people in south Asian regions. In Pakistan, people use Roman Urdu to express their reviews, and this applied in the education domain where students used Roman Urdu to express their feedback. It is very time-consuming and labor-intensive process to handle qualitative opinions manually. Additionally, it can be difficult to determine sentence semantics in a text that is written in a colloquial style like Roman Urdu. This study proposes an enhanced word embedding technique and investigates the neural word Embedding (Word2Vec and Glove) to determine which perfo

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
View Publication Preview PDF