Preferred Language
Articles
/
iqjmc-1736
Editorial message
...Show More Authors

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Journal Of Engineering
Editorial Board
...Show More Authors

Editorial Board

View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering
Editorial Board
...Show More Authors

Editorial Board

View Publication Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Engineering
Editorial Board
...Show More Authors

Editorial Board

View Publication Preview PDF
Publication Date
Tue Oct 30 2018
Journal Name
Journal Of Engineering
Editorial Board
...Show More Authors

Editorial Board

View Publication
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Investigation Age message
...Show More Authors

The research is the realization of a manuscript of Abdul Baqi al-Omari nicknamed (Farouk) relative to Al-Faruq Omar bin al-Khattab (Radha) and (Mosli) relative to the city of Mosul in Iraq and (immediate) to improvisation of poetry immediately lived during the era of the Ottomans. Entitled (Picture written by the whole secret sea embroidered crown literary style genius with wisdom poetry and magical prose Hazrat Abdul Baqi Effendi Omari comforting and congratulated to Sheikh Ali Talabani dear) and the manuscript in two versions, the subject of my brothers, in which congratulations and condolences Sheikh Ali Talabani, an administrative position in the Ottoman Empire, And the importance of the manuscript Baha The twist on the hair of Abdul

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Editorial: Current advances in anti-infective strategies
...Show More Authors

Infectious diseases pose a global challenge, necessitating an exploration of novel methodologies for diagnostics and treatments. Since the onset of the most recent pandemic, COVID-19, which was initially identified as a worldwide health crisis, numerous countries experienced profound disruptions in their healthcare systems. To combat the spread of the COVID-19 pandemic, governments across the globe have mobilized significant efforts and resources to develop treatments and vaccines. Researchers have put forth a multitude of approaches for COVID-19 detection, treatment protocols, and vaccine development, including groundbreaking mRNA technology, among others.

This matter represents not only a scientific endeavor but also an essenti

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Sun May 01 2022
Journal Name
Rimak International Journal Of Humanities And Social Sciences
BUILDING THE MEDIA MESSAGE AND DESIGNING IT THROUGH INFOGRAPHICS
...Show More Authors

The study aims to identify how to build the media message in an artistic design style (infographic) to reach the mechanism of building the media message by infographic in the researched news sites. For the survey method, which is one of the best methods used to study the subject of the research, the researcher used the method of content analysis, the employee of the research tool, a quantitative and qualitative content analysis form for the study of 74 infographics that appeared during the research period in the research sample sites. The study revealed a number of results, most notably 1. The surveyed sites employed the information in a manner based on images, shapes and data, that is, through the use of the visual element and the

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Scopus (8)
Scopus