Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
Al–bahith Al–a'alami
The Effectiveness of Modern Media Techniques in Developing Good Citizenship Values among Students
...Show More Authors

This research aims to identify the effectiveness of modern media technologies represented by satellite TV in the development of good citizenship values when students. To achieve this purpose were selected a sample of 44 students in the Department of Electrical technologies in Technical Institute in Nasiriyah in southern Technical University during the school year (2015-2016).
Was determined the general objectives of the use of modern media techniques represented satellite TV is to promote the values of good citizenship among the sample of students in order to make them good citizens in the community could contribute to the development and upgrading it. And put the general plan of research. Promising researchers measure of good citizen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the Current Financial Crisis : Causes and Solutions (Iraqi crisis a model , based on the public budget for the fiscal year 2016)
...Show More Authors

The research aims to analysis of the current financial crisis in Iraq through knowing its causes and then propose some solutions that help in remedy the crisis and that on the level of expenditures and revenues, and has been relying on the Federal general budget law of the Republic of Iraq for the fiscal year 2016 to obtain the necessary data in respect of the current expenditures and revenues which necessary to achieve the objective of the research , and through the research results has been reached to a set of conclusions which the most important of them that causes of the current financial crisis in Iraq , mainly belonging to increased expenditures and especially the current ones and the lack of revenues , especially non-oil o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 08 2023
Journal Name
مجلة حمورابي للدراسات
adolescents exposure to the specialized satellite channel cartoon network and its relationship to their level of technological culture
...Show More Authors

Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (19)
Scopus Crossref
Publication Date
Tue May 16 2023
Journal Name
Political Sciences Journal
Public Rights and Freedoms in the Constitution of the Sultanate of Oman and Ways to Protect Them
...Show More Authors

What distinguishes human rights issues is their importance to the international community and their importance to democratic political regimes, because they are the axis of any political regime that seeks to achieve a successful democratic path and a stable state. So, countries that are interested in human rights try to enshrine those rights and freedoms in their constitutions and reinforce their concepts in their laws and legislations. Not to mention its involvement in international conventions and treaties concerned with human rights and freedoms, and this is what the Sultanate of Oman has worked on and confirm in the provisions of its 1996 constitution and its amendments

View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Iraq's Public Budget for 2015 Ambition & challenges
...Show More Authors

One of the most critical functions of the government is the devising and planning for the Public Budget for the coming years. Studying any budget of any given state would directly reflect on its intentions and collective direction during a certain time span. Since all allocations represent the government's agenda and time plan for coming years. And the size of each allocation would measure the priority of each budgetary item. Because of the eminent importance of the public budget planning in Iraq, a country of abundant riches and human resources that flow in the national economy, we present this research that would cover the resources versus expenditures of Iraq's public budget endured by the government to sustain its various sec

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Nurses' Knowledge About Chest Physiotherapy Techniques for Patients With Corona Virus Disease
...Show More Authors

Abstract

Objective(s): A descriptive study aimed to determine nurses' knowledge about chest physiotherapy techniques for patients with Corona virus disease and observe the relationship between nurses' knowledge and their socio-demographic characteristics.

Methodology: The study was directed in isolation units of Al- Hussein teaching hospitals in Thi-Qar, Iraq for the period from June 1st,  2022 to November 27th, 2022. Non- probability (purposively) sample comprised 41 nurses. A questionnaire was used for data collection and it consists of two parts: the first part comprises socio demographic features, the second part includes self- administered questionnaire sheet wa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

     Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd  level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet

... Show More
View Publication Preview PDF