Preferred Language
Articles
/
UhauZIkBVTCNdQwCaonr
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 500 per frame, and each number value reaches more than 1000 to be used or switched when needed. The method also provides some difficulty in guessing the keys from the transmitted video and the reason for the development and emergence of many communication programs Viber, WhatsApp, and other programs, enabling to use the proposed method in these programs.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 01 2007
Journal Name
University Of Baghdad, College Of Education For Pure Science (ibn Al-haitham), Department Of Mathematical
Thesis.On Solvability of an Operator Equation-
...Show More Authors

Publication Date
Mon Oct 01 2012
Journal Name
Iraqi Journal Of Medical Sciences
Lower Gastrointestinal Bleeding: An Etiological Study.
...Show More Authors

Publication Date
Sat Mar 01 2008
Journal Name
The Third International Conference On Mathematical Sciences
On Solvability of an Operator Equation
...Show More Authors

Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Debt swaps An Islamic Economic Evaluation
...Show More Authors

Introduction:

        Many business owners suffer major financial problems during periods of financial stagnation, the decline of markets and businesses, or under the impact of financial shocks for certain reasons that result in large debts and the consequent financial and legal obligations. This is the beginning of a long and endless path of suffering and the search for a safe exit. It is even worse for financial institutions to facilitate financial solutions that rely on lending as a solution to their financial problem. Debt and its consequences increase, and the problem deepens and becomes complicated until things become entangled and the escape or declaration of bank

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The trend to Joint Audit as an approach to Improve the Financial Reports Quality - An Applied Study –
...Show More Authors

This study aimed at identifying the trend to applying the Joint Audit as an approach to improve the financial reports quality with all their characteristics (Relevance, Reliability, Comparability, Consistency), as well as enclose the difficulties that faced the auditors in the Gaza Strip in implementing the Joint Audit. In order to achieve the study aims, a measure was used to identify the trend to apply the Joint Audit and it was distributed to the study sample which is consisting of (119) individuals and retrieved thereof (99) valid for analysis, approximately (83.2%), (69) of them are Auditors, (30) financial managers and accountants. The researcher used the analytical descriptive method, and after analyzing the results, the s

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Aug 19 2020
Journal Name
Revista De Chimie
Synthesis, Characterization and Biological Evaluation of Cr(III), Fe(III), Co(II), Ni(II), Zn(II) and Cd(II) Complexes Using an Azo Dye as Ligand
...Show More Authors

Azo ligand 11-(4-methoxyphenyl azo)-6-oxo-5,6-dihydro-benzo[4,5] imidazo[1,2-c] quinazoline-9-carboixylic acid was derived from 4-methoxyaniline and 6-oxo-5,6-dihydro-benzo[4,5]imidazo[1,2-c]quinazoline-9-carboxylic acid. The presence of azo dye was identified by elemental analysis and spectroscopic methods (FT-IR and UV-Vis). The compounds formed have been identified by using atomic absorption in flame, FT.IR, UV-Vis spectrometry magnetic susceptibility and conductivity. In order to evaluate the antibacterial efficiency of ligand and its complexes used in this study three species of bacteria were also examined. Ligand and its complexes showed good bacterial efficiencies. From the obtained data, an octahedral geometry was proposed for all p

... Show More
Publication Date
Sun Oct 01 2017
Journal Name
Al–bahith Al–a'alami
Employ of Public Relations in Building Awareness of Security against Terrorism A Survey of the Employees of the Directorate General of Public Relations and Media at the Ministry of Interior
...Show More Authors

This study aims at identifying the role played by Public Relations in the field of security awareness of the dangers of terrorism. The research is directed to the employees at the Directorate General of Public Relations and Media at the Ministry of Interior. And that on the basis that those who play an important role in the security awareness are the security institutions, primarily the Ministry of Interior, since this Directorate is responsible for all subjects related to the public security using public relations science. It aims at identifying the functions, methods and communication tools used by the Directorate to raise awareness about the dangers of terrorism. In order to achieve the research objectives, the researcher uses the sur

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Gabriel Garcia Marquez and Magic Realism: The Story of "An Old Man With Enormous Wings" as An Example
...Show More Authors

This research work considers one of the authentic and most modern modes of storytelling, as employed by Garcia Marquez in one of his famous stories "An Old ManWith Enormous Wings" (1972). Technically, the work is divided into four parts: the first serves as an introduction to his literary works, his use of magic realism, and addresses mainly the interests of Arab readers; the second handles the development of modern short story through the perspective of realism, until the emergence of magic realism as a new style; the third deals with the origin, nature and development of this style, and his mastery of it; the fourth part tries to analyze the story and its plot, thoughts, characters, symbols and metaphors, in the light of the artistic p

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Consumer protection in e-marketing contracts An analytical study.: Consumer protection in e-marketing contracts An analytical study.
...Show More Authors

Marketing plays a role in the transfer of consumer desires through research, studies and satisfy the needs process, and with the technical development has evolved and marketing departments in the world of commerce has made great strides since the expansion of the trade deal, especially in light of spread of the Internet and the culture of use where he became a lot as individuals or institutions are dealings via electronic shopping . In all cases, we find that the consumer is important party, and that the legal rules did not leave the shopping process or contracting E without protection and I've dealt with so many studies through the civil protection for the consumer in electronic contracts legally with an analytical study of the

... Show More
View Publication Preview PDF