Preferred Language
Articles
/
jih-1571
On Application of Discrete Logarithms in Information - Hiding and Knapsack Problem with New Properties of Sk-Sets
...Show More Authors

Discrete   logarithms  are applied      in many    cryptographic problems  . For instance ,   in public   key .  and for construction of sets with disti nct sums of  k-clcments.  The   purpose o r  this   paper

is  to  modify  the  method ol' informationl1·iding  using        discrete logarithms  , introduce new properties of St - sets ,   uscdthe direct product   of    groups   to construct  cyclic group and finally, present modified   method   for   knapsack    problem using each of discrere logarithms and S,-sets.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 29 2024
Journal Name
2024 3rd International Conference On Digital Transformation And Applications (icdxa)
The Mediating Role of Cobit 2019 in Managing the Relationship Between Qualitative Characteristics of Accounting Information and Information Asymmetry
...Show More Authors

The Mediating Role of Cobit 2019 in Managing the Relationship Between Qualitative Characteristics of Accounting Information and Information Asymmetry

View Publication
Scopus Crossref
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
The problem of political change in Algeria
...Show More Authors

The article aims to study the crisis of political change  from three Phases . The first focuses on the crises of political legitimacy and democratic postponement, as fundamental issues in analyzing the phenomenon of power struggle through the dialectic between the concept of historical legitimacy and institutional fragility from the beginning of statehood in 1962 to the stage of multi-partyism and the cessation of the electoral process in the 1990s. While the second focuses on the question of the monopoly of power in the post-terrorism and national reconciliation according to considerations  Political, social and security measures to prolong the life of the regime and avoid the demands of political change brought about

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 18 2019
Journal Name
Political Sciences Journal
The succession of power's problem in Lebanon
...Show More Authors

Abstract Political power in Lebanon is a fundamental objective of any political organization, whether political party or political group. Thus, there is a conflict of power. There are two kinds of political conflict that are differentiated by the idea of legitimacy. The competition is in the political system when the agreement between the social forces is considered legitimate, and the conflict is on the political system when the agreement between these forces ceases to be legitimate and Are working to topple it and seek to establish an alternative system. Therefore, the succession of power in Lebanon is a result of the competition and political conflict, which is in turn a result of the large number of regional and international players

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Results In Engineering
Electrochemical preparation and characterization of a new configuration SnO2 anode and its application for treating petroleum refinery wastewater
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Physical properties of CdS/CdTe/CIGS thin films for solar cell application
...Show More Authors

View Publication
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Robust Optimization with practical application
...Show More Authors

The purpose of this paper is applying the robustness in Linear programming(LP) to get rid of uncertainty problem in constraint parameters, and find the robust optimal solution, to maximize the profits of the general productive company of vegetable oils for the year 2019, through the modify on a mathematical model of linear programming when some parameters of the model have uncertain values, and being processed it using robust counterpart of linear programming to get robust results from the random changes that happen in uncertain values ​​of the problem, assuming these values belong to the uncertainty set and selecting the values that cause the worst results and to depend buil

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 15 2022
Journal Name
Bmc Health Services Research
Design and evaluation of a new mobile application to improve the management of minor ailments: a pilot study
...Show More Authors
Abstract<sec> <title>Background

Seeking pharmacist advice about minor ailments is a common practice among Iraqi patients because such advice is free and quick. Unfortunately, the assessment and management of minor ailments by Iraqi pharmacists were inappropriate. Therefore, this study aimed to develop a model for a mobile application that can assist community pharmacists in the diagnosis and management of minor ailments.

Methods

The scientific content of the application was based on the information in the symptoms in the pharmacy and British Nati

... Show More
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Publication Date
Mon Apr 01 2013
Journal Name
مجلة كلية بغداد للعلوم الاقتصادية الجامعة العدد الخاص بمؤتمر الكلية
A propose method for hiding image into image
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref