Preferred Language
Articles
/
ZRfYNI8BVTCNdQwCsWFt
Integrated System of Information hiding by Applying Three levels
...Show More Authors

MB Mahmood, BN Dhannoon

View Publication
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 28 2018
Journal Name
2018 4th International Conference On Computer And Technology Applications (iccta)
Improving accuracy of CADx system by hybrid PCA and backpropagation
...Show More Authors

—Medical images have recently played a significant role in the diagnosis and detection of various diseases. Medical imaging can provide a means of direct visualization to observe through the human body and notice the small anatomical change and biological processes associated by different biological and physical parameters. To achieve a more accurate and reliable diagnosis, nowadays, varieties of computer aided detection (CAD) and computer-aided diagnosis (CADx) approaches have been established to help interpretation of the medical images. The CAD has become among the many major research subjects in diagnostic radiology and medical imaging. In this work we study the improvement in accuracy of detection of CAD system when comb

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The Information Effect in Iraqi Universities: The Information Effect in Iraqi Universities
...Show More Authors

Abstract:
This research (The effect of information in Iraqi universities) wants to
explain the aims and the opinions of Iraqi universities lecturers during the
globalization era and information technology .
The results we have got about using the computers by the lecturers of
Iraqi universities just in illustration and statistic as depends on there works

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Studies In Systems, Decision And Control
The Effect of Using an Accounting Information System Based on Artificial Intelligence in Detecting Earnings Management to Enhance the Sustainability of Economic Units
...Show More Authors

This research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Applying Some OF Freinet's Instructional Techniques IN Our Educational Institutes
...Show More Authors

Each educational system aims at having an effective way of

teaching that leads to an effective learing.This needs preparing good inputs in their standard qualifications and good effective ways in the phae of processes during which reliable and valid methods and technjqucs of teaching are used.

Instructional techniques have gained, lately, an increasing and

great attention of educationists because of their many techniques arc Frcinet's  which they can be applied in our cducutional institution (schools, institutes and colleges),after giving a brief profile of Frcint

and  his educa      tiona! ideas and  his innovations in the field of

instructional techniques.<

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Improvement of the blood characteristics of the broiler chickens by addition tryptophan acid supplement levels in ration
...Show More Authors

This study were implemented on (60) broiler chick with one day age divided into three equal groups , first one was given basal diet while group two and three given adiet contain 0.01% ,0.02% tryptophan respectively for 7 weeks . The results show that the chicks recevd the tryptophan have asigneficant increasment in hemoglobin concentration, red blood cells count, packed cell volume and increased the level of globuline concentration and lymphocyte % which mean that the addition of tryptophan improve blood picture charactores and the immunity of the broiler chickens and this evident from the good health state and decrease the mortality among birds .

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Uob
Effect of Irrigation Levels and Organic Matter in The Growth, Yield and its Quality for Chilli Pepper Under Organic Farming System
...Show More Authors

Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
Using Spatial Videos, Google Earthtm and Geographic Information System to Dynamically Monitor Built Environment Changes In a Challenging Environment: Baghdad, Iraq.
...Show More Authors

Urban expansion and its environmental and safety effects are one of the critical information needed for future development planning, safety considerations and environmental management. This work used two methods to monitor urban expansion and it's environmental and safety effects, the first is based on Google Maps for the years 2002 and 2010, and the second was the usage of spatial videos for the year 2013. Although the usage of satellite images is critical to know and investigate the general situation and the total effects of the expansion on a large piece of area, but the Spatial videos do a very detailed fine scale investigation, site conditions regarding both environmental and safety cannot be easily distinguished fr

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 06 2025
Journal Name
International Journal Of Engineering &amp; Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref