Preferred Language
Articles
/
jcoeduw-1015
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 01 2017
Journal Name
Pak. J. Pharm. Sci.
Moxifloxacin reduces stenotrophomonas maltophilia adhesion to mouse intestinal tract in vitro
...Show More Authors

Scopus (5)
Scopus
Publication Date
Mon Dec 30 2024
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Formation evaluation for Mauddud Formation in Bai Hassan oilfield, Northern Iraq
...Show More Authors

   Formation evaluation is a critical process in the petroleum industry that involves assessing the petrophysical properties and hydrocarbon potential of subsurface rock formations. This study focuses on evaluating the Mauddad Formation in the Bai Hassan oil field by analyzing data obtained from well logs and core samples. Four wells were specifically chosen for this study (BH-102, BH-16, BH-86, and BH-93). The main objectives of this study were to identify the lithology of the Mauddud Formation and estimate key petrophysical properties such as shale volume, porosity, water saturation, and permeability. The Mauddud Formation primarily consists of limestone and dolomite, with some anhydrites present. It is classified as a clean for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Arpn Journal Of Engineering And Applied Sciences
Assessment of vegetable cover in south Iraq by remote sensing methods
...Show More Authors

The vegetable cover plays an important role in the environment and Earth resource sciences. In south Iraq, the region is classified as arid or semiarid area due to the low precipitations and high temperature among the year. In this paper, the Landat-8 satellite imagery will be used to study and estimate the vegetable area in south Iraq. For this purpose many vegetation indices will be examined to estimate and extract the area of vegetation contain in and image. Also, the weathering parameters must be investigated to find the relationship between these parameters and the arability of vegetation cover crowing in the specific area. The remote sensing packages and Matlab written subroutines may be use to evaluate the results.

Preview PDF
Scopus
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Management And Enterprise Development
Studying The Decision-Making State and Impact in Iraqi Construction Projects
...Show More Authors

View Publication
Crossref
Publication Date
Mon Feb 10 2025
Journal Name
International Linguistics Research
A Semiotic Study of Reduplicative Words in Selected American Slang Expressions
...Show More Authors

This study explores the semiotic aspects of American slang, specifically focusing on the phenomenon of reduplicative expressions in informal speech. Despite the extensive research on American slang, limited attention has been given to the cultural and mythical meanings embedded within reduplicative expressions. To address this gap, the study investigates how these expressions convey denotative, connotative, and mythical meanings within casual American discourse. The objectives of the study include: 1. To what extent does Barthes’ semiotic model hold potential for application in this study? 2. How are reduplicative slang expressions widely used in everyday American life? 3. To what extent do qualitative and quantitative methods hav

... Show More
View Publication
Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Indian Journal Of Forensic Medicine And Toxicology. Vol 14 (2
Psychosocial Consequences of Children with Idiopathic Growth Hormone Deficiency in Baghdad
...Show More Authors

Scopus
Publication Date
Thu Jul 01 2021
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Embryonic Development of Spinal Cord in White Choeked Bulbul (Pycnonotus leucotis)
...Show More Authors

The study concerned the embryonic development of spinal cord of white choeked bulbul Pycnonotus leucotis. The spinal cord at the age 40 hour’s incubation from the neural tube and its tissue wall is composed of two layers, the ependymal layer and mantle layer. The spinal cord differentiation is completed at the age 7 day’s incubation, its, were we notice that the central canal is clear and cavity lined with neurons and we note the arrangement of gray matter in the form of the letter H and its inside and it is characterized by dorsal and ventral horns and the gray matter substance and note the formation of dorsal medium spetum and ventral medium fissure.

Publication Date
Tue Nov 01 2022
Journal Name
Alustath
Metrical Phonology in Classical English and Arabic Poetry: A Contrastive Study
...Show More Authors

One of the prominent goals of Metrical Phonology Theory is providing stress of poetry on the syllable-, the foot-, and the phonological word- levels. Analysing poetry is one of the most prominent and controversial issues for the involved number and types of syllables, feet, and meters are stable in poetry compared to other literary texts. The prosodic seeds of the theory have been planted by Firth (1948) in English, while in Arabic يديهارفلا in the second half of the eighth century (A.D.) has done so. Investigating the metrical structure of poetry has been conducted in various languages, whereas scrutinising the metrical structure of English and Arabic poetry has received little attention. This study aims at capturing the

... Show More
Publication Date
Wed Apr 24 2019
Journal Name
Annals Of Telecommunications
Traveling distance estimation to mitigate unnecessary handoff in mobile wireless networks
...Show More Authors

View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
The Impact of Operating System on Bandwidth in Open VPN Technology
...Show More Authors

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will

... Show More
View Publication Preview PDF
Crossref