Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun May 01 2016
Journal Name
Journal Of Engineering
Improving the Accuracy of Handheld GPS Receivers Based on NMEA File Generating and Least Squares Adjustment
...Show More Authors

This study aims to improve the quality of satellites signals in addition to increase accuracy level delivered from handheld GPS data by building up a program to read and decode data of handheld GPS. Where, the NMEA protocol file, which stands for the National Marine Electronics Association, was generated from handheld GPS receivers in real time using in-house design program. The NMEA protocol file provides ability to choose points positions with best status level of satellites such as number of visible satellite, satellite geometry, and GPS mode, which are defined as accuracy factors. In addition to fix signal quality, least squares technique was adopted in this study to minimize the residuals of GPS observations and enh

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of the Strategic Performance of the State Board of Antiquities and Heritage/Case Study
...Show More Authors

This research aims to the possibility of evaluating the strategic performance of the State Board for Antiquities and Heritage (SBAH) using a balanced scorecard of four criteria (Financial, Customers, Internal Processes, and Learning and Growth). The main challenge was that the State Board use traditional evaluation in measuring employee performance, activities, and projects. Case study and field interviews methodology has been adopted in this research with a sample consisting of the Chairman of the State Board, 6 General Managers, and 7 Department Managers who are involved in evaluating the strategic performance and deciding the suitable answers on the checklists to analyze it ac

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 14 2016
Journal Name
Bio--genetics Journal
Correlation of Her-2/neu gene amplification by FISH and CISH with clinicopathological parameter of Iraqi breast carcinoma patients at central public health laboratories
...Show More Authors

The objective of the study: is to investigate the correlations between the HER2 neu gene status with the clinicopathological parameters of infiltrative breast carcinoma. A total of seventy four Iraqi breast cancer patients were collected from one center (Department of Public Health) paraffin blocks were collected from histopathology department central public health laboratories, Bagdad, Iraq from 2014-2015. The cases which has been taken included invasive ductal and invasive lobular carcinoma type Women age were ranged from 24-80 years old. Evaluation of Her-2/neu gene amplification status was done using FISH and CISH techniques that showed a significant correlations with clinicopathological parameters.

Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Designing and Application of Mathematical Model A Multi – Objectives for Assessment The Quality Of The Project : A Case Study at Saad Public Construction Company
...Show More Authors

Abstract

This research aims to design a multi-objective mathematical model to assess the project quality based on three criteria: time, cost and performance. This model has been applied in one of the major projects formations of the Saad Public Company which enables to completion the project on time at an additional cost that would be within the estimated budget with a satisfactory level of the performance which match with consumer requirements. The problem of research is to ensure that the project is completed with the required quality Is subject to constraints, such as time, cost and performance, so this requires prioritizing multiple goals. The project

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 01 2023
Journal Name
Warith Scientific Journal
اثر الاستقلالية والخبرة المالية والمحاسبية للجنة التدقيق في ملائمة قيمة المعلومات المحاسبية
...Show More Authors

ه رثا قيقحتلو ،ةيبساحملا تامولعملا ةميق ةمئلام يف قيقدتلا ةنجلل ةيبساحملاو ةيلاملا ةربخلاو ةيللاقتسلاا ثحبلا تايضرف رابتخلا ةمزلالا تانايبلا عمجل ةنابتسا ةرامتسا مادختساب ةثحابلا تماق ةساردلا فده ةللاد وذ رثأ دجوي(يهو ةيبساحملاو ةيلاملا ةربخلل ةيئاصحإ ةللاد وذ رثا دجوي( ، )ةيبساحملا تامولعملا ةميق ةمئلام ىلع قيقدتلا ةنجل ةيللاقتسلا ةيئاصحا )ةيبساحملا تامولعملا ةميق ةمئلام ىلع ( نم تنوكت ةنيع ىلع تعزو ث

... Show More
View Publication
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the theoretical framework of the REA accounting model Used in the design of accounting information systems
...Show More Authors

Researchers often equate database accounting models in general and the Resources-Events-Agents (REA) accounting model in particular with events accounting as proposed by Sorter (1969). In fact, REA accounting, database accounting, and events accounting are very different. Because REA accounting has become a popular topic in AIS research, it is important to agree on exactly what is meant by certain ideas, both in concept and in historical origin. This article clarifies the analyzing framework of REA accounting model and highlights the differences between the terms events accounting, database accounting, semantically-modeled accounting, and REA accounting. It als

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
أهمية الإفصاح عن المعلومات المتعلقة بتدريب وتطوير العاملين وأثره في قرارات الاستثمار
...Show More Authors

يكتسب موضوع تدريب وتطوير العاملين أهمية بالغة في الظروف الاقتصادية الحالية التي تسودها مفاهيم وتوجهات جديدة كعولمة الاقتصاد ورأس المال المعرفي والفكري، وحيث صارت المعارف والمهارات والقابليات التي يمتلكها العاملون محركاً أساسياً باتجاه النجاح، وعنصراً مهماً في زيادة فاعلية منشأة الأعمال، وإدامة وجودها واستمرارها.

إن العاملين المدربين بشكل جيد على عمليات المنشأة وطبيعة المواد التي تستخدمها وإنتاجه

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Studying the Factors Effects on the Flowability of ZnO-CuO/γAl2O3 Catalyst Through Hopper Before Tableting Process
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Enhancing audit procedures in accordance with the international assurance standard through the implementation of a proposed program
...Show More Authors

Abstract:             

                  The research seeks to identify the role of the International Assurance Standard (3402) in the auditor's procedures, as the importance of the research stems from providing assurance services for control tools through reports that are prepared according to this standard, which contribute to strengthening audit procedures through a proposed assurance program. Many conclusions were reached, the most important of which The assurance operations are considered among the operations with a special assignme

... Show More
View Publication Preview PDF