Preferred Language
Articles
/
jcoeduw-1015
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Eneurologicalsci
Double encephalocele with an excellent outcome postoperatively: A case report from Iraq
...Show More Authors

HTH Ali Tarik Abdulwahid , Ahmed Dheyaa Al-Obaidi , Mustafa Najah Al-Obaidi, eNeurologicalSci, 2023

View Publication
Scopus (3)
Scopus
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Application of Sulfur-2,4-dinitrophenylhydrazine as Modifier for Producing an Advantageous Concrete
...Show More Authors

In this investigative endeavor, a novel concrete variety incorporating sulfur-2,4-dinitrophenylhydrazine modification was developed, and its diverse attributes were explored. This innovative concrete was produced using sulfur-2,4-dinitrophenylhydrazine modification and an array of components. The newly created sulfur-2,4-dinitrophenylhydrazine modifier was synthesized. The surface texture resulting from this modifier was examined using SEM and EDS techniques. The component ratios within concrete, chemical and physical traits derived from the sulfur-2,4-dinitrophenylhydrazine modifier, chemical and corrosion resistance of concrete, concrete stability against water absorption, concrete resilience against freezing, physical and mechanical p

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
On Fully (m,n)-stable modules relative to an ideal A of
...Show More Authors

Let R be a commutative ring with non-zero identity element. For two fixed positive integers m and n. A right R-module M is called fully (m,n) -stable relative to ideal A of , if for each n-generated submodule of Mm and R-homomorphism . In this paper we give some characterization theorems and properties of fully (m,n) -stable modules relative to an ideal A of . which generalize the results of fully stable modules relative to an ideal A of R.

View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The nature of financial system Is it an necessity or A selection?
...Show More Authors

   The Financial systems can be classified into two types. The first is the market–oriented, which is applied in United States and United Kingdom. While the second is bank-oriented as in Japan and Germany.

   This study tries to explain the reasons which make some countries adopt the first one instead of the second, and the contrary. So the study consists of three sections. The first deals with the concept of financial system and it are functions. The second displays the indicators which are used to classify the financial systems, while the third one is devoted to the factors that determine the type of financial system .These sections followed by some conclusions.

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
An Energy-Aware and Load-balancing Routing scheme for Wireless Sensor Networks
...Show More Authors

<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (11)
Scopus Crossref
Publication Date
Fri Nov 21 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Occupational dental wear among El-Kubasis cement factory workers - An observational study
...Show More Authors

Background: Loss of tooth structure may be due to tooth to tooth contact and presence of abrasive components in the work environment. The aim of study was planned to evaluate the occurrence of dental attrition among Cement factory workers. Material and Method: The Sample included all workers chronically exposed to cement dust in the EL-Kubaisa cement factory (95 workers). A comparative group of workers (97) were non-exposed to cement dust was selected. All workers were males in gender with age range (25-55) years. The assessment of tooth wear was based on the criteria of smith and knight, 1984. Results: The maximum tooth wear score for exposed workers was 84.2% while non exposed workers was 38.1%,with statistical differences between two g

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 07 2022
Journal Name
2022 Iraqi International Conference On Communication And Information Technologies (iiccit)
Construct an Efficient DDoS Attack Detection System Based on RF-C4.5-GridSearchCV
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Tue Mar 12 2019
Journal Name
Journal Of Global Pharma Technology,
Bentonite as an adsorption surface for bromothymol blue dye from aqueous solution
...Show More Authors

Scopus
Publication Date
Wed Jul 01 2015
Journal Name
The Sai 2015
An optimal defuzzification method for interval type-2 fuzzy logic control scheme
...Show More Authors

Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (9)
Crossref