Preferred Language
Articles
/
jih-1571
On Application of Discrete Logarithms in Information - Hiding and Knapsack Problem with New Properties of Sk-Sets
...Show More Authors

Discrete   logarithms  are applied      in many    cryptographic problems  . For instance ,   in public   key .  and for construction of sets with disti nct sums of  k-clcments.  The   purpose o r  this   paper

is  to  modify  the  method ol' informationl1·iding  using        discrete logarithms  , introduce new properties of St - sets ,   uscdthe direct product   of    groups   to construct  cyclic group and finally, present modified   method   for   knapsack    problem using each of discrere logarithms and S,-sets.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On the Double of the Emad - Falih Transformation and Its Properties with Applications
...Show More Authors

In this paper, we have generalized the concept of one dimensional Emad - Falih integral transform into two dimensional, namely, a double Emad - Falih integral transform. Further, some main properties and theorems related to the double Emad - Falih transform are established. To show the proposed transform's efficiency, high accuracy, and applicability, we have implemented the new integral transform for solving partial differential equations. Many researchers have used double integral transformations in solving partial differential equations and their applications. One of the most important uses of double integral transformations is how to solve partial differential equations and turning them into simple algebraic ones. The most important

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Nov 01 2024
Journal Name
Egyptian Journal Of Veterinary Sciences
Contamination with Proteus and Staphylococcus spp. Effect on Physical Properties of Sheep Semen
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Eastern-european Journal Of Enterprise Technologies
The influence of information technology (IT) on firm profitability and stock returns
...Show More Authors

This research study examines the impact of information technology on firm profitability and stock returns. Using a comprehensive dataset of firms across various industries, this research employs rigorous statistical analysis techniques to investigate the relationship between IT investments, firm profitability metrics, and stock returns. The study focuses at how IT investments affect financial performance measures including return on assets (ROA) and return on equity (ROE), with P-values of 0.34 and 0.12, respectively. Furthermore, the study investigates the influence of IT on stock returns, taking into account market capitalization, industry trends, and macroeconomic variables. This study's conclusions center on the beneficial assoc

... Show More
View Publication
Scopus (23)
Crossref (6)
Scopus Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On The Modified Divergence Information Criterion
...Show More Authors

In this work (paper), we investigate about the robustness of the modified divergence Information Criterion (MDIC), which proposed by Mantalos, Mattheou and Karagrigoriou (2008), to determine the probability of the Criterion picking up the true lag for Autoregressive process, when the error term of this process is normally and Non normally distributed. We obtained the results for different sample sizes by using simulation.

 

View Publication Preview PDF
Publication Date
Wed Jan 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
αg_Ị-open sets and αg_Ị-functions
...Show More Authors

     The objective of this paper is to show modern class of open sets which is an -open. Some functions via this concept were studied and the relationships such as continuous function strongly -continuous function -irresolute function -continuous function.

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Extreme Values on Streeter-Phleps Model Parameter Estimators With Application Abstract
...Show More Authors

Abstract

   The extremes effects in parameters readings which are BOD (Biological Oxygen Demands) and DO(Dissolved Oxygen) can caused error estimating of the model’s parameters which used to determine the ratio of de oxygenation and re oxygenation of the dissolved oxygen(DO),then that will caused launch big amounts of the sewage pollution  water to the rivers and it’s turn is effect in negative form on the ecosystem life and the different types of the water wealth.

   As result of what mention before this research came to employees Streeter-Phleps model parameters estimation which are (Kd,Kr) the de oxygenation and re oxygenation ratios on respect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Critical Success factors of Strategic Information system and it's relation with Strategic Decisions Effectiveness
...Show More Authors

The organization uses many techniques and methods to ensure that they will succeed and adapted with velocity change in the internal and external environment by decision taking, especially strategic decisions.

Strategic decisions are very important for organization success because it can predict the future and deal with uncertainty, in this circumstances they need accurate and comprehensive information to make effective strategic decision.

To achieve that purpose it must owned successful Strategic Information System ( SIS ) and determined the critical success factors for this system ,which can assisted the worker to focus on the important activities to develop it.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Sun Apr 20 2025
Journal Name
Ihjpas
Synthesis, Characterization, and Study of Liquid Crystals Properties of New Five Heterocyclic Compounds
...Show More Authors

Heterocyclic compounds are employed in many applications, and numerous researchers have created liquid crystals by adding heterocyclic to the structures of these molecules. This work includes the synthesis and characterization of new compounds that contain 5H-thiazolo [4,3-b][1,3,4] thiadiazol united in multiple steps, starting with the synthesis of the aldehyde compound [I] by reaction chloro ethyl acetate with 4-hydroxybenzaldehyde in the presence of ethanol and potassium carbonate, followed by reactions with thiosemicarbazide, mercapto acetic acid in sulphuric acid to produce compound [II] then reflux compound [II] with hydrazine hydrate to product compound [III], after that reaction the later compound with nalkoxybenzaldehyde [IV]n and

... Show More
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref