Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Dec 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
دور بعض الأفعال المنظمية في إدارة الوقت دراسة مسحية في عينة من المكتبات الجامعية في بغداد
...Show More Authors

 The organizations recognize what the effective role of time management in achieving competitive advantage and success. But the effectiveness depends on integrating some organization actions which perspective are relating with it by significance relations and high affect. From this the research problem is arising، which descripe the recognizing of libraries managers for the role of some organizational actions. The samples from (40) libraries managers are chosen.

The major results: these organizational actions are related and affected on the time management  if integrated with  one anothers more than if related in separate.  &nbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Chilean Journal Of Statistics
A method of multi-dimensional variable selection for additive partial linear models.
...Show More Authors

In high-dimensional semiparametric regression, balancing accuracy and interpretability often requires combining dimension reduction with variable selection. This study intro- duces two novel methods for dimension reduction in additive partial linear models: (i) minimum average variance estimation (MAVE) combined with the adaptive least abso- lute shrinkage and selection operator (MAVE-ALASSO) and (ii) MAVE with smoothly clipped absolute deviation (MAVE-SCAD). These methods leverage the flexibility of MAVE for sufficient dimension reduction while incorporating adaptive penalties to en- sure sparse and interpretable models. The performance of both methods is evaluated through simulations using the mean squared error and variable selection cri

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Al-rafidain Journal Of Computer Sciences And Mathematics
Braille Character Recognition System: Review
...Show More Authors

The Braille Recognition System is the process of capturing a Braille document image and turning its content into its equivalent natural language characters. The Braille Recognition System's cell transcription and Braille cell recognition are the two basic phases that follow one another. The Braille Recognition System is a technique for locating and recognizing a Braille document stored as an image, such as a jpeg, jpg, tiff, or gif image, and converting the text into a machine-readable format, such as a text file. BCR translates an image's pixel representation into its character representation. As workers at visually impaired schools and institutes, we profit from Braille recognition in a variety of ways. The Braille Recognition S

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 30 2018
Journal Name
Journal Of Engineering
Accuracy Assessment of Stonex X-300 Laser Scanner Cameras
...Show More Authors

Assessment the actual accuracy of laboratory devices prior to first use is very important to know the capabilities of such devices and employ them in multiple domains. As the manual of the device provides information and values in laboratory conditions for the accuracy of these devices, thus the actual evaluation process is necessary.

In this paper, the accuracy of laser scanner (stonex X-300) cameras were evaluated, so that those cameras attached to the device and lead supporting role in it. This is particularly because the device manual did not contain sufficient information about those cameras.

To know the accuracy when using these cameras in close range photogrammetry, laser scanning (stonex X-300) de

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Recognizing Different Foot Deformities Using FSR Sensors by Static Classification of Neural Networks
...Show More Authors

Sensing insole systems are a promising technology for various applications in healthcare and sports. They can provide valuable information about the foot pressure distribution and gait patterns of different individuals. However, designing and implementing such systems poses several challenges, such as sensor selection, calibration, data processing, and interpretation. This paper proposes a sensing insole system that uses force-sensitive resistors (FSRs) to measure the pressure exerted by the foot on different regions of the insole. This system classifies four types of foot deformities: normal, flat, over-pronation, and excessive supination. The classification stage uses the differential values of pressure points as input for a feedforwar

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue Mar 01 2016
Journal Name
International Journal Of Engineering Research And Advanced Technology (ijerat)
Speeding Up Back-Propagation Learning (SUBPL) Algorithm: A New Modified Back_Propagation Algorithm
...Show More Authors

The convergence speed is the most important feature of Back-Propagation (BP) algorithm. A lot of improvements were proposed to this algorithm since its presentation, in order to speed up the convergence phase. In this paper, a new modified BP algorithm called Speeding up Back-Propagation Learning (SUBPL) algorithm is proposed and compared to the standard BP. Different data sets were implemented and experimented to verify the improvement in SUBPL.

View Publication
Publication Date
Sun Jun 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
التجربة الصينية في الإصلاح والتنمية : بحث في خصوصية المنهج والدروس المستخلصة
...Show More Authors

The Chain's experience of reform and development monopolized with deep and exclusive concerns of the world.

Starting from the academic departments of universities and researches and study centers to the world's organizations and institutes passing through the government and the official systems in many countries that get affected , positively or negatively, now or later by china's economic development .

Searching in the china's experience of reform and development  is important because it takes place in a developing country in which the leadership is succeeded in choosing the right methodology an model of changing and operating economics, making use of all the past national a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Comparison of Some of Estimation methods of Stress-Strength Model: R = P(Y < X < Z)
...Show More Authors

In this study, the stress-strength model R = P(Y < X < Z)  is discussed as an important parts of reliability system by assuming that the random variables follow Invers Rayleigh Distribution. Some traditional estimation methods are used    to estimate the parameters  namely; Maximum Likelihood, Moment method, and Uniformly Minimum Variance Unbiased estimator and Shrinkage estimator using three types of shrinkage weight factors. As well as, Monte Carlo simulation are used to compare the estimation methods based on mean squared error criteria.  

View Publication Preview PDF
Scopus (7)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Apr 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Psychophysiological Control in Behavior
...Show More Authors

         The Feedback Concept has been spread as an organized trend for scientific research since it has a significant importance for human behavior and how it has been directed and controlled by the individual, feedback has numerous definitions but the simplest definition is; feedback is the information received by the individual from the output of his behavior, In addition to the mutual relationship between the individual and the stimulation that provide him with the basic information by the biological control of his behavior, Since feedback cannot be accomplished without receiving information from the inner and outer environment, the biological and physiological information become the ma

... Show More
View Publication Preview PDF