Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 01 2016
Journal Name
Journal Of Engineering
Improvement of Traffic Movement for Roads Network in Al-Kadhimiya City Center
...Show More Authors

Numerous regions in the city of Baghdad experience the congestion and traffic problems. Due to the religious and economic significance, Al-Kadhimiya city (inside the metropolitan range of Baghdad) was chosen as study area. The data gathering stage was separated into two branches: the questionnaire method which is utilized to estimate the traffic volumes for the chosen roads and field data collection method which included video recording and manual counting for the volumes entering the selected signal intersections. The stage of analysis and evaluation for the seventeen urban roads, one highway, and three intersections was performed by HCS-2000 software.The presented work plots a system for assessing the level of service

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
University Of Southern Queensland
An Investigation of Leadership Style and the Strategic Planning Process of Public and Private Colleges in Iraq: An Empirical Study
...Show More Authors

Globalisation and rapid environmental change have created many challenges for public and private organisations across Iraq as a developing country, particularly in the higher education sector. This includes, for example, decreases in government funding; increased demand for higher education; a need for economic transformation, and related competitiveness of organizations. Such challenges require exceptional leaders and strategic planning in order to take action to improve. In Iraq, the higher education sector is still one of the main foundations in progressing the knowledge economy. Studies into leadership style, strategic planning processes, and the importance of leadership and organisational culture to an organisation’s success have bee

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors

Concealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary,  hide two bits from the message in  two bits of the least significant b

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Morphotectonic Analysis of Wadi Al-Batin Alluvial Fan, South of Iraq, Using Remote Sensing and GIS Techniques
...Show More Authors

This research aimed to know the tectonic activity of the Wadi Al-Batin alluvial fan using hydrological and morphotectonic analyses. Wadi Al-Batin alluvial fan is deposited from Wadi Al-Rimah in Saudi Arabia, which extended to Iraqi and Kuwait international boundaries. The longitudinal and transverse faults that characterize this region were common. The Abu- Jir-Euphrates faults have a significant impact on the region. The faults zone consists of several NW- SE trending faults running from the Rutba in western Iraq to the south along the Euphrates through Kuwait and meeting the Al-Batin fault to the Jal Al-Zor fault. The Hydromorphometric analysis of the present fan shows five watersheds having asymmetry shapes, more elongated and activi

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
A Comparison Between Recursive Least-Squares (RLS) and Extended Recursive Least-Squares (E-RLS) for Tracking Multiple Fast Time Variation Rayleigh Fading Channel
...Show More Authors

In order to select the optimal tracking of fast time variation of multipath fast time variation Rayleigh fading channel, this paper focuses on the recursive least-squares (RLS) and Extended recursive least-squares (E-RLS) algorithms and reaches the conclusion that E-RLS is more feasible according to the comparison output of the simulation program from tracking performance and mean square error over five fast time variation of Rayleigh fading channels and more than one time (send/receive) reach to 100 times to make sure from efficiency of these algorithms.

View Publication Preview PDF
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of Rotation on the Heat Transfer of a Couple Stress Fluid in A Nonuniform Inclined Asymmetrical Channel with Inclined MHD
...Show More Authors

 The purpose of this research is to investigate the effects of rotation on heat transfer using
inclination magnetohydrodynamics for a couple-stress fluid in a non-uniform canal. When the
Reynolds number is low and the wavelength is long, math formulas are used to describe the stream
function, as well as the gradient of pressure, temperature, pressure rise and axial velocity per
wavelength, which have been calculated analytically. The many parameters in the current model
are assigned a definite set of values. It has been noticed that both the pressure rise and the pressure
gradient decrease with the rise of the rotation and couple stress, while they increase with an
increase in viscosity and Hartmann nu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Mobile position estimation using artificial neural network in CDMA cellular systems
...Show More Authors

Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The result

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Mobile Position Estimation using Artificial Neural Network in CDMA Cellular Systems
...Show More Authors

Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through tha

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2023
Journal Name
Iraqi Journal Of Science
Optimal Spatial Distribution of Gasoline Stations in Baghdad Province Utilizing GIS Techniques
...Show More Authors

Studying the spatially distribution pattern of fuel station in province of Baghdad
was done by utilizing GIS techniques which they are the most powerful tools for
design, display and analysis for the spatial data. Nearest Neighbor Analysis method
was applied for analyzing the spatial distributions of the fuel stations. Baghdad was
considered to be divided in to two main parts (outskirts of Baghdad and center of
Baghdad). The nearest neighbour for all parts of Baghdad indicates for the
distribution pattern is random and differs from place to another in randomly rate.

View Publication
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the Performance of IT Governance According to COBIT5 Framework by Using the Balanced Scorecard
...Show More Authors

The research aims to clarify the COBIT5 framework for IT governance and to develop of a criterion based on Balanced Scorecard that contributes in measuring the performance of IT governance. To achieve these goals, the researchers adopted the deductive approach in the design of balanced scorecard to measure the IT governance at the Bank of Baghdad that was chosen because it relied heavily on IT.

The research has reached a number of conclusions, the most important of which is that the performance of IT department in the Bank of Baghdad falls within the good level that requires constant monitoring, the most committed items of Balanced Scorecard by the Bank were customer, internal operation, growth and finally the financial item; IT

... Show More
View Publication Preview PDF
Crossref