•  34
    Data Hiding Based on Improved Exploiting Modification Direction Method and Huffman Coding
    with Tanzila Saba, Mohammed Hazim Alkawaz, Amjad Rehman, and Ghazali Sulong
    Journal of Intelligent Systems 23 (4): 451-459. 2014.
    The rapid growth of covert activities via communications network brought about an increasing need to provide an efficient method for data hiding to protect secret information from malicious attacks. One of the options is to combine two approaches, namely steganography and compression. However, its performance heavily relies on three major factors, payload, imperceptibility, and robustness, which are always in trade-offs. Thus, this study aims to hide a large amount of secret message inside a gra…Read more
  •  16
    1. Academics as a profession is traditionally viewed as stress-free due to high levels of academic freedom, clarity of job description and performance indicators, and tenure protected positions (Th...
  •  13
    Assessing the subtitling of emotive reactions: a social semiotic approach
    with Muhammad A. A. Taghian
    Semiotica 2023 (252): 51-96. 2023.
    This article attempts to evaluate emotive meanings across languages and cultures expressed and elicited semiotically from viewers. It investigates the challenges of subtitling emotive feelings in the American filmHomeless to Harvard(2003) into Arabic. It adopts Paul Thibault’s (2000. The multimodal transcription of a television advertisement: Theory and practice. In Anthony Baldry (ed.),Multimodality and multimediality in the distance learning age, 311–385. Campobasso: Palladino Editore) method …Read more
  •  11
    States in northern Nigeria are the latest in a list of political entities around the world formalizing religious law, or institutionalizing Shari'ah, into their public law system. Shari'ah applies in many Muslim-majority countries in the realm of personal law. However, when it is expanded and made to apply as part of public law, it carries enormous constitutional implications. This article examines the institutionalization of Shari'ah in twelve northern states of Nigeria in year 2000 and the lik…Read more
  •  7
    Vertex-Edge-Degree-Based Topological Properties for Hex-Derived Networks
    with Muhammad Imran
    Complexity 2022 1-13. 2022.
    A topological index can be focused on uprising of a chemical structure into a real number. The degree-based topological indices have an active place among all topological indices. These topological descriptors intentionally associate certain physicochemical assets of the corresponding chemical compounds. Graph theory plays a very useful role in such type of research directions. The hex-derived networks have vast applications in computer science, physical sciences, and medical science, and these …Read more
  •  4
    A Study of Hexagon Star Network with Vertex-Edge-Based Topological Descriptors
    with Eshrag A. Refaee
    Complexity 2021 1-7. 2021.
    There are many network topology designs that have emerged to fulfill the growing need for networks to provide a robust platform for a wide range of applications like running businesses and managing emergencies. Amongst the most famous network topology designs are star network, mesh network, hexagonal network, honeycomb network, etc. In a star network, a central computer is linked with various terminals and other computers over point-to-point lines. The other computers and terminals are directly …Read more
  • Makanat Al- Aql Fi Al-Fikr Al- Arabi Buhuth Wa-Munaqashat Al-Nadwah Al-Fikriyah Allati Nazzamaha Al-Majma Al- Ilmi Al- Iraqi
    with Majma al- Ilmi al- Iraqi and Nadwat Makanat Al- Aql Fi Al-Fikr Al- Arabi
    Markaz Dirasat Al-Wahdah Al- Arabiyah. 1996.