Preferred Language
Articles
/
lBeosI0BVTCNdQwCBRje
The intention to harm others is one of the forms of abuse of the right - a study in the light of American law
...Show More Authors

In a world of limited space, the owners are always surrounded by others next to them, and, consequently, there is hardly any activity which the owner may exercise on his land which would not affect the other owners. If he builds a building, that building may block the sun's rays or the air from the buildings next to it and owned by other people. And if he runs a business, the lands adjacent to that business may be overburdened with the accompanying noise or traffic. If oil is prospected in a land, the neighboring lands may be deprived of oil or their owners may be exposed to toxic fumes. Hence the importance of researching the intention of harming others, as it is one of the most important forms of abuse in the use of the right (especially in the context of neighborly relations), as sometimes this intention is a means to achieve a specific end, and at other times it is the end that the abusive individual seeks to achieve.

View Publication
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
المحددات الاقتصادية والاجتماعية للبطالة في السودان -دراسة قياسية باستخدام انحدار المركبات الرئيسة للمدة (1981-2015م)
...Show More Authors

Considering the magnitude of its economic, social and political impact, unemployment represents a crucial challenge confronting the majority of the countries of the world. The problem of the study was the high rates of unemployment in Sudan and the inability of economic growth rates to keep pace with the steady increases in unemployment rates during the study period. This study aimed to identify the economic and social variables influencing unemployment rate in Sudan, in addition to measuring the impact of these variables over the period (1981-2015). Data were collected from databases of the World Bank and Atlas of the World's data .The study hypothesized the presence of statistically significant and direct relationship between u

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
Couniform Modules
...Show More Authors

In this paper, we introduce and study a new concept named couniform modules, which is a dual notion of uniform modules, where an R-module M is said to be couniform if every proper submodule N of M is either zero or there exists a proper submodule N1 of N such that is small submodule of Also many relationships are given between this class of modules and other related classes of modules. Finally, we consider the hereditary property between R-module M and R-module R in case M is couniform.

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Synthesis AgO Nanoparticles by Nd:Yag Laser with Different Pulse Energies
...Show More Authors

     One technique used to prepare nanoparticles material is Pulsed Laser Ablation in Liquid (PLAL), Silver Oxide nanoparticles (AgO) were prepared by using  this technique, where silver target was submerged in ultra-pure water (UPW)  at room temperature after that Nd:Yag laser which characteristics by 1064 nm wavelength, Q-switched, and 6ns pulse duration was used to irradiated silver target. This preparation method was used to study the effects of laser irradiation on Nanoparticles synthesized by used varying laser pulse energy 1000 mJ, 500 mJ, and 100 mJ, with 500 pulses each time on the particle size. Nanoparticles are characterized using XRD, SEM, AFM, and UV-Visible spectroscopy. All the structural peaks determined by the XRD

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref