Preferred Language
Articles
/
jcoeduw-726
Steganographic scheme to avoid statistical Steganalysis
...Show More Authors

significant bits either in the spatial domain or frequency domain sequentially or pseudo
randomly through the cover media (Based on this fact) statistical Steganalysis use different
techniques to detect the hidden message, A proposed method is suggested of a stenographic
scheme a hidden message is embedded through the second least significant bits in the
frequency domain of the cover media to avoid detection of the hidden message through the
known statistical Steganalysis techniques.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 01 2012
Journal Name
Ijcsi International Journal Of Computer Science
Implementing a novel approach an convert audio compression to text coding via hybrid technique
...Show More Authors

Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Plant Archive
Isolation of candida spp. From cancer patients who suffered oral candidiasis due to immunodeficiency
...Show More Authors

solation of candida spp. From cancer patients who suffered oral candidiasis due to immunodeficiency

Scopus (2)
Scopus
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
The reasons for the failure of Bishara CO2 compressor belonging to Southern Fertilizer Company
...Show More Authors

In this research study failed Annunciation No. 10 for the fourth phase of the pressure of carbon dioxide of the company for Southern Fertilizers and repeated the failures more than once for the same gospel was a detailed study of the gospel included a series tests for properties Mechanical and Structural addition to the tests microscopic and scanning electron microscope shows m This study parameters and a failure Elal well as the existence of an old internal cracks in the metal of the Annunciation

View Publication Preview PDF
Publication Date
Thu Jul 08 2021
Journal Name
Turkish Online Journal Of Qualitative Inquiry (tojqi)
Civil Protection of Rights contiguous to Author’s Royalty in Iraqi Law A comparative study
...Show More Authors

Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
An Approximate solution for two points oundary value problem corresponding to some optimal control
...Show More Authors

this paper presents a novel method for solving nonlinear optimal conrol problems of regular type via its equivalent two points boundary value problems using the non-classical

View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Evaluating Training Programs According to model Kirkpatrick / field research in the Health Maysan Directorate .
...Show More Authors

This present paper aim at knowing  the process of evaluating the training program that could be applied  in Maysan Health office  for it significance and importance in field of management and vocational staff  preparations  of high  scientific experience in different fields of  Health.  The society of research includes staffs  working in Maysan Health Office  , of specialists ,  dentists, pharmacists, laboratories, nursing  and administrators. Their number is 100 employees, the researcher has designed questionnaire by depending on "Kirkpatrick"  for assessing  the training . The researcher has used   thorough survey and has entailed 90 questionnaire,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 10 2017
Journal Name
Assiut J. Agric. Sci.
The response of white eggplant plants to foliar application with boron and potassium silicate
...Show More Authors

Publication Date
Sun Jan 01 2017
Journal Name
National Journal Of Physiology, Pharmacy And Pharmacology
The attitudes of final year medical and pharmacy students to interprofessional learning in Iraq
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
The exact location and its relation to cognitive method (risk-caution) of University students
...Show More Authors

The present study aimed to identify the exact location and its relation to cognitive
method (risk_caution) to university students. The sample consisted of (300) students who
were chosen randomly and equally. The study results indicated that students possess an
internal exact location and they also use risk cognitive method. The study also indicated that
there is a prophesies which is an exact location for others to reach to caution cognitive
method. Depending on these results, the study recommended to benefit from the results of the
study variables and from the measurement of the exact location and method of cognitive
(risk_caution) to identify male and female students and especially by consulting units at
college

... Show More
View Publication Preview PDF