Preferred Language
Articles
/
BxYD9osBVTCNdQwCpee8
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steganographic method hides embedded data at various locations in cover irregularly or randomly, whereas the locations of cover for information hiding are not constant, this property will increase the level of security for proposed method. In the proposed method, the sender needs sending a file that has small size via any communication channel and that considered as a key while sending a cover is not necessary to recipient if both agree about downloading it from the internet before sending a file. The contents of this file are invaluable for an attacker. The programming language that used in programming this proposed method is C++ language. Steganographically, The proposed steganographic method is strong and robust. It is possible classifying this proposed method as a public key steganography system and substitution system at the same time.

View Publication
Publication Date
Mon Oct 01 2012
Journal Name
Al–bahith Al–a'alami
The Role of Social Media in Changing Media
...Show More Authors

Media theories and studies have provided many diligences on the concept of social media and the circle of influence, including the theory of social marketing which deals with how to promote ideas espoused by the elite in a society to become a recognized social value. The emergence of social networks provided a revolutionary breakthrough, taking the media to unprecedented horizons; and giving its users great opportunities to influence and move across borders without restrictions and censorship, except in a relatively limited manner.

So, the emergence of social media has created channels of live broadcasting from its audience in a method of development that changes the essence of the known communication theories; a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Oct 01 2012
Journal Name
Albahith Alalami
The Role of Social Media in Changing Media
...Show More Authors

Media theories and studies have provided many diligences on the concept of social media and the circle of influence, including the theory of social marketing which deals with how to promote ideas espoused by the elite in a society to become a recognized social value. The emergence of social networks provided a revolutionary breakthrough, taking the media to unprecedented horizons; and giving its users great opportunities to influence and move across borders without restrictions and censorship, except in a relatively limited manner. So, the emergence of social media has created channels of live broadcasting from its audience in a method of development that changes the essence of the known communication theories; and stops the monopoly of th

... Show More
Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering Science And Technology
A proposed dual size design for energy minimization in sub-threshold circuits
...Show More Authors

Sub-threshold operation has received a lot of attention in limited performance applications.However, energy optimization of sub-threshold circuits should be performed with the concern of the performance limitation of such circuit. In this paper, a dual size design is proposed for energy minimization of sub-threshold CMOS circuits. The optimal downsizing factor is determined and assigned for some gates on the off-critical paths to minimize the energy at the maximum allowable performance. This assignment is performed using the proposed slack based genetic algorithm which is a heuristic-mixed evolutionary algorithm. Some gates are heuristically assigned to the original and the downsized design based on their slack time determined by static tim

... Show More
Preview PDF
Scopus
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
A Proposed Audit Program for Lease Contracts in Insurance Companies Applying (IFRS16)
...Show More Authors

Abstract:

                 The research aims to clarify the impact of adopting the IFRS16 financial reporting standard on lease contracts in insurance companies on audit procedures. The change in the classification of lease contracts in the case of adopting the IFRS16 financial reporting standard necessarily requires audit procedures that are compatible with this change. A proposed audit program was prepared, guided by international auditing standards, based on the study of the client's environment and analysis of external and internal risks in the light of financial and non-financial indicators. The researchers reached a set of concl

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 01 2025
Journal Name
Al–bahith Al–a'alami
Evaluation in the Kurdish Media Institutions (A Descriptive Study Survey)
...Show More Authors

The importance of evaluation depends on many institutions, whether governmental or private, including media institutions, rely on the list to evaluate the weight of things and appreciation, as well as judging things, achievements, and everything related to the institution is concerned. Because through evaluation, institutions can recognize weaknesses and strengths. It is also an effective tool for management review, through which the institution can review everything related to planning and decision-making, leadership, incentives and other administrative matters.

Therefore, this study attempts to shed light on the evaluation process, its basics and its importance in general and in the Kurdish media institutions as a model in part

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
The Communicative Integration in New Media: Building a Communicative Model
...Show More Authors

The internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 10 2018
Journal Name
Al–bahith Al–a'alami
Using of digital media and its effect on constructing the value system of Iraqi society (Field study on a sample of the audience for the city of Baghdad model)
...Show More Authors

With the great development in the field of the Internet, the talk about the new media and its implications began, And its interactive services have made the future of media material sometimes participating in it and manufacturing it at other times,
the public is seeking information and choosing the appropriate ones, as well as exchanging messages with the sender after what the role of the receiver is just receiving information only.
This study aims to demonstrate the effects of using digital media in various forms and types to construct the value system of Iraqi society through the identification of the following aims:
Identify the most popular digital media for the Iraqi public in their daily lives on the Internet.
Identify

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Advances In Systems Science And Applications
A New Face Swap Detection Technique for Digital Images
...Show More Authors

View Publication
Scopus
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Digital collage in contemporary arts
...Show More Authors

The research tagged (Digital Collage in Contemporary Art) consisted of four chapters. The first chapter was devoted to the methodological framework of the research. The problem ended with the following questions: How does digital collage represent contemporary art? What is the variable at the level of meaning shifts in composing works according to the digital collage? Was the digital collage a qualitative leap in the path of the aesthetic pattern in art? How does digital collage interfere with contemporary life and societies? It included the aim of the research and its importance, while the second chapter dealt with two topics, the first (reading in the concept of collage), and the second (digital collage). The third chapter was devoted

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref