Preferred Language
Articles
/
3xddBpMBVTCNdQwCJsSi
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sharing and the generating random positions of hiding. This method has been in hiding a text file and recovered without loss of information, as well as not noticing any deformation of the image. Where it was hiding a text file size of 20 KB in image cover (250x250) pixels, the result of MSE is 0.696 and PSNR is 49.211.

Crossref
View Publication
Publication Date
Mon Dec 19 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETECTION OF MICROBIAL CONTAMINATION IN IMPORTED FROZEN CHICKEN THAT AVAILABLE IN LOCALLY MARKETS: DETECTION OF MICROBIAL CONTAMINATION IN IMPORTED FROZEN CHICKEN THAT AVAILABLE IN LOCALLY MARKETS
...Show More Authors

The study was carried out to study the quality of 7 samples of imported frozen chicken that are available in locally markets. These samples were collected from Baghdad markets in June 2010. The results were showed that the all samples were not content the name of company and batch number one the labeling, while the microbial test refer to found contamination in all samples, but it in the limited of Iraqi standers specification for frozen chicken, also note Staphylococcus aureus in all samples, the samples C1 and C2 have Salmonella ohio, while not observe Coliform bacteria in all samples.

View Publication Preview PDF
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Integrated Reporting in Reducing Information Asymmetry: Analytical Research of A sample of Iraqi Banks listed on the Iraq Stock Exchange
...Show More Authors

Allowing Iraqi companies to use multiple systems and policies leads to varying levels of disclosure and no high symmetry between report preparers and users, and that the adoption of integrated reporting can reduce information asymmetry. The theoretical side addressed the concepts of these variables, and in the practical side the binary variable (0, 1) was used. To compensate for the value of the independent variable (integrated reporting) based on the Central Bank of Iraq’s classification of banks according to the (CAMLES) index, and the dependent variable (information asymmetry) was measured through two measures (price difference, unusual return), the research community was represented by (5) Banks out of the total of banks li

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 25 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Health TV shows and consumer awareness/ Analytical study of the Green Apple program.: Health TV shows and consumer awareness/ Analytical study of the Green Apple program.
...Show More Authors

Television plays an important role in health education development of the consumer, where the health programs offered by satellite channels offering a variety of subjects that deal with human health in general, as do people with some misconceptions health practices either due to lack of awareness or a low level of culture they have is one of the problems that require a search, so the research aims to clarify what the TV play in health education to the consumer through a content analysis of health issues covered by the television health programs and identify health issues positive and negative in everyday human life, it has been identified green apple program Broadcast of the channel mbc1 as a model for health programs offered by the Arab

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 30 2025
Journal Name
Infotech Spectrum: Iraqi Journal Of Data Science
Evaluating AI Language Models in News Retrieval: A Comparative Study Of ChatGPT-Plus and DeepSeek (R1)
...Show More Authors

The increasing complexity of how humans interact with and process information has demonstrated significant advancements in Natural Language Processing (NLP), transitioning from task-specific architectures to generalized frameworks applicable across multiple tasks. Despite their success, challenges persist in specialized domains such as translation, where instruction tuning may prioritize fluency over accuracy. Against this backdrop, the present study conducts a comparative evaluation of ChatGPT-Plus and DeepSeek (R1) on a high-fidelity bilingual retrieval-and-translation task. A single standardize prompt directs each model to access the Arabic-language news section of the College of Medicine, University of Baghdad, retrieve the three most r

... Show More
View Publication
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2019
Journal Name
The Iraqi Journal For Information And Documentation Studies
The role and importance of scientific research in creating new knowledge and its impact on developing the cognitive capabilities of information and librarians and their Employees
...Show More Authors

The research aims at identifying the importance of scientific research for researchers and in creating new knowledge، development and utilization of mental and cognitive energies and developed them with the ability to research، extrapolation، meditation and then conclusion. The information was collected by interviewing the Secretary-General of the Central Library and by distributing questionnaire forms to the (33) teaching staff of the College of Higher Education. The responses of the society were analyzed the result and the recommendations were the most important 1. Information specialist and all employees of the administrators and technicians in the centers of information sources (libraries) and in the field are considered scientific r

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 16 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of information technology on tax evasion
...Show More Authors

The research aims at shedding light on the impact of information technology in reducing tax evasion in the General Authority for Taxation. In order to achieve this, the research relied on the analysis of its variables as a main tool for collecting data and information. The results showed that there is a positive and positive effect of information technology on tax evasion. The impact of information technology on increasing tax revenues and reducing the phenomenon of tax evasion In the performance of the research sample, the research sought to highlight the importance of tax information technology through its data and information to the tax administration for the purpose of completing the process Taxpayers for persons subject to income ta

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 06 2021
Journal Name
Webology
The Role Of Digital Informatics In The Quality Of Scientific Research In In University Libraries: An Analytical Study Of Iraqi Libraries
...Show More Authors

View Publication
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Delivery Route Management based on Dijkstra Algorithm
...Show More Authors

For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Jun 18 2021
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
The Effectiveness of Educational Pillars Based on Vygotsky's Theory in Achievement and Information Processing Among First Intermediate Class Students
...Show More Authors

The aim of the research is to identify the effectiveness of the educational pillars strategy based on Vygotsky's theory in mathematical achievement and information processing of first-grade intermediate students. In pursuit of the research objectives, the experimental method was used, and the quasi-experimental design was used for two equivalent groups, one control group taught traditionally and the other experi-mental taught according to the educational pillars strategy. The research sample consisted of (66) female students from the first intermediate grade, who were inten-tionally chosen after ensuring their equivalence, taking into account several factors, most notably chronological age and their level of mathematics, and they we

... Show More
View Publication
Crossref (2)
Crossref