Preferred Language
Articles
/
jcoeduw-1015
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Spike neural network as a controller in SDN network
...Show More Authors

The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Nov 19 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study of Two Types Finite Graphs in KU-Semigroups
...Show More Authors

      In this Ë‘work, we present theË‘ notion of the Ë‘graph for a KU-semigroup  as theË‘undirected simple graphË‘ with the vertices are the elementsË‘ of  and weË‘Ë‘study the Ë‘graph ofË‘ equivalence classesË‘ofË‘  which is determinedË‘ by theË‘ definition equivalenceË‘ relation ofË‘ these verticesË‘, andË‘ then some related Ë‘properties areË‘ given. Several examples are presented and some theorems are proved. ByË‘ usingË‘ the definitionË‘ ofË‘ isomorphicË‘ graph, Ë‘we showË‘ thatË‘ the graphË‘ of equivalence Ë‘classes Ë‘and the Ë‘graphË‘of Ë‘a KU-semigroup Ë‘  areË‘ theË‘ sameË‘,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 27 2020
Journal Name
Iraqi Journal Of Science
Application of Probit Analysis in Studying the Allelopathy Phenomenon
...Show More Authors

   Probit analysis is a type of regression used to analyze the relationship between a stimulus and the quantal response. Allelopathy refers to direct or indirect negative or positive effects of one plant on another through the release of chemical compounds into the environment. This study was carried out to apply probit analysis in investigating the allelopathic effects of the leaves aqueous extracts of apple of Sodom [Calotropis procera (Aiton) W.T.] on the inhibition of seed germination of African rattlebox (Crotalaria saltiana Andr.). A laboratory experiments were carried out at the Faculty of Agricultural Sciences, University of Gezira, Sudan in season 2014/15. Ten concentrations (2.3, 4.6

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Lecture Notes In Electrical Engineering
Handling Mobility with Network Virtualization in IoT WAVE Context
...Show More Authors

Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized

... Show More
View Publication
Crossref
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
A Study of Graph Theory Applications in IT Security
...Show More Authors

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.

This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Re

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2014
Journal Name
The Saudi Journal For Dental Research
Oral cancer trends in Iraq from 2000 to 2008
...Show More Authors

Abstract Background The aim of this study was to identify differences in oral cancer incidence among sexes, age groups and oral sites over time in Iraqi population. Methods Data was obtained from Iraqi cancer registry, differences and trends were assessed with the Wilcoxon matched-pairs signed-ranks test and Regression test, respectively. Results In Iraq from 2000 to 2008, there were 1787 new cases of oral cancer registered, 1035 in men and 752 in women. Cancer at all oral sites affected men more than women. The Tongue other (ICD-02) is the most frequent site follow by lip (ICD-00). Conclusion The decrease in the percent of oral cancer incidence in Iraq not compatible with the high percent of exposure to the risk factors, Iraqi cancer regis

... Show More
View Publication
Scopus (15)
Crossref (7)
Scopus Crossref
Publication Date
Thu Sep 12 2019
Journal Name
Al-kindy College Medical Journal
Assessment of stromal eosinophilia in cutaneous squamous cell carcinoma
...Show More Authors

Background: Tumor associated tissue eosinophilia (TATE) has been described in a variety of neoplasms. In regard to squamous cell carcinoma, some studies worldwide done to assess stromal eosinophilia in oral and cervical squamous cell carcinoma. The objectives of this study is to evaluate the association of stromal eosinophilic infiltration of cutaneous squamous cell carcinoma and to detect the significance of this association.

Aim of the study

The aim of our study is to establish the relationship between the degree of stromal eosinophilia and the level of invasion and the histological grade in cutaneous squamous cell carcinoma.

Methods: In this retrospective study

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
On Soft bc-Open Sets in Soft Topological Spaces
...Show More Authors

In this paper, we offer and study a novel type generalized soft-open sets in topological spaces, named soft Æ„c-open sets. Relationships of this set with other types of generalized soft-open sets are discussed, definitions of soft Æ„ , soft bc- closure and soft bc- interior are introduced, and its properties are investigated. Also, we introduce and explore several characterizations and properties of this type of sets.

View Publication Preview PDF
Scopus (9)
Scopus Crossref
Publication Date
Wed Jul 31 2024
Journal Name
International Journal Of Health & Medical Research
Review Article: Cupping Therapy in Treatment of Certain Diseases
...Show More Authors

The research undertaken has provided a comprehensive insight into the practice of cupping therapy, a traditional treatment modality that has seen resurgence in. modern complementary medicine. This exploration, focusing on a spectrum of. Conditions such as migraines, lower back pain, neck pain, knee osteoarthritis, and chronic urticaria, highlights the potential benefits and the necessity for a deeper. Scientific understanding of cupping therapy. Cupping therapy, with its roots deeply embedded in ancient medical practices, offers a unique approach to treatment by promoting healing through increased blood flow and the release of toxins from the body. The application of this therapy in treating migraines has shown promising results, su

... Show More
Preview PDF
Crossref
Publication Date
Tue Sep 03 2019
Journal Name
Biochem. Cell. Arch.
CHLAMYDIA PNEUMONIAE INFECTION AND ENDOTHELIAL DYSFUNCTION IN CARDIOVASCULAR DISEASES
...Show More Authors

This study designed to evaluate the relationship between the Matrix metalloproteinase -9(MMP-9), soluble Vascular endothelial cadherin(VE-CAD)and Chlamydia pneumonia infection in cardiovascular diseases patients. All blood sample were subjected for molecular detection of C.pneumoniae by using conventional polymerase chain reaction (PCR) depending on 16S rRNA while the level of serum MMP-9, VE-CAD measured by enzyme linked immunosorbent assay (ELISA). Seventy patients who suffering from cardiovascular diseases (angina, myocardial infraction and atherosclerosis) aged between 33-86 years have been investigated and compared to twenty of apparently healthy individuals as control group. Twenty six samples (37.14%) revealed positive results for C.

... Show More