Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Human Face Recognition Based on Local Ternary Pattern and Singular Value Decomposition
...Show More Authors

There is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 16 2008
Journal Name
Journal Of Planner And Development
The relationship between the uses of land and the network of movement and roads (study area, Najaf city)
...Show More Authors

The interaction in the city is reflected in the movement of people motivated by their activities and their economic and social goals, which include many variables subject to the planning process in the interpretation of this movement and the mapping of trends of transport intensity through the concept of transport function and its functional relationships with the uses of the earth in the sustainability and effectiveness of the movement of transport and Economic activity and population movement. Transport planners are concerned with the requirements of land use, which are linked to and included in the transport planning process as a factor for the future transport needs. There is a strong relationship between the transport system

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 16 2024
Journal Name
مجلة كلية التربية للبنات
تصميم حقيبة احصائية الكترونية لأخصائي المعلومات و المكتبات
...Show More Authors

Publication Date
Fri Sep 01 2006
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
نظام المعلومات المحاسبية ودوره في عملية اتخاذ القرارات
...Show More Authors

يرجع تاريخ الاصلاحات الادارية إلى سبعينات القرن الماضي  ،ولاسيما الندوة التي عقدت لبحث العوامل المؤثرة في انخفاض الانتاجية عام 1976، وعملية ترشيق الاجهزة الادارية للدولة عام 1987.

            ان بحثنا الموسوم (نظام المعلومات المحاسبية ودوره في عملية اتخاذ القرارات) يتم عرضه في فرعين مترابطين، هما:

  • المحاسبة نظام معلومات.
  • الادارة صانعة للقرار.<

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 01 2006
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
الدور المفاهيمي للمحاسب في تصميم نظام المعلومات المحاسبي
...Show More Authors

ان تقدير مسؤولية المحاسب في تصميم نظام المعلومات المحاسبي من منظور تاريخي سبقت استخدام الحاسوب كأداة معلوماتية للاعمال، لما له من رؤيا بالتطورات الرئيسية لنظام المعلومات والتي اهمها تحديد متطلبات مستخدمي المعلومات وتعيين مضمون وشكل مخرجات النظام من التقارير وتحديد مصادر البيانات وانتقاء القواعد المحاسبية الملائمة فضلاً عن الرقابة الضرورية لتكامل وفاعلية النظام.

ان النظم المحاسبية التقليدية غالبا

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of accounting information in making capital budget decisions
...Show More Authors

Faced economic units face the option of restoring the capital budget annually, and the information provided for the preparation of these budgets, including financial and non-financial aspects have an important impact in the numbers of these budgets, and these units differ in the ability of their own accounting systems to maintain this information. The aim of this research is to investigate the volume of accounting information that is relied on and the reasons for the differences between one unit and another in the various economic sectors in the Iraqi environment.

The most important results of the research is the weakness of the adoption of decision makers in the Iraqi environment and lack of sufficient attention in the decision-

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Achieving customer satisfaction by booking electronic flight tickets via the Internet of Things technology
...Show More Authors

Abstract:

                The aim of this research is to highlight the importance of achieving customer satisfaction by using information technology and Internet networks in the process of purchasing flight tickets, and switching from the traditional method of purchasing and payment operations to the electronic method, to reduce the financial and non-financial risks associated with the traditional purchasing process, as well as saving time, effort and costs for the customer. The researcher used the deductive approach in linking the variables (achieving customer satisfaction and Internet of Things technology for booking electronic tickets)

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Mobility Models over UDP Traffic Pattern for MANET Using NS-2
...Show More Authors

  The current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes,  different traffic rates, different traffic sources, different pause times and different simulation times .  A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
Water Movement through Soil under Drip Irrigation using Different Hydraulic Soil Models
...Show More Authors

Drip irrigation is one of the conservative irrigation techniques since it implies supplying water directly on the soil through the emitter; it can supply water and fertilizer directly into the root zone. An equation to estimate the wetted area in unsaturated soil is taking into calculating the water absorption by roots is simulated numerically using HYDRUS (2D/3D) software. In this paper, HYDRUS comprises analytical types of the estimate of different soil hydraulic properties. Used one soil type, sandy loam, with three types of crops; (corn, tomato, and sweet sorghum), different drip discharge, different initial soil moisture content was assumed, and different time durations. The relative error for the different hydrauli

... Show More
View Publication Preview PDF
Crossref (3)
Crossref