Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Designing and Application of Mathematical Model A Multi – Objectives for Assessment The Quality Of The Project : A Case Study at Saad Public Construction Company
...Show More Authors

Abstract

This research aims to design a multi-objective mathematical model to assess the project quality based on three criteria: time, cost and performance. This model has been applied in one of the major projects formations of the Saad Public Company which enables to completion the project on time at an additional cost that would be within the estimated budget with a satisfactory level of the performance which match with consumer requirements. The problem of research is to ensure that the project is completed with the required quality Is subject to constraints, such as time, cost and performance, so this requires prioritizing multiple goals. The project

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 28 2019
Journal Name
Iraqi Journal Of Science
Using GIS and Remote Sensing Techniques to Study Water Quality Changes and Spectral Analysis of Tigris River within Mosul City, North of Iraq
...Show More Authors

     The aim of the study is the measuring of changes in the spectral reflectivity water quality, analyzing the seasonal difference of Tigris River within Mosul City in the north of Iraq using Geographic Information Systems (GIS) and remote sensing techniques during the period (2014-2018). For this paper, Satellite images of the 8 Landsat in 2018 for four seasons have been selected in order to study the seasonal changes on the river they took place during 2018.  A total of ten sample datasets were taken at the upstream, midstream and downstream along the Tigris River. This research focuses on analyzing the locational variance of reflectance, analyzing seasonal difference, and finding modeling algal amount change.

... Show More
View Publication Preview PDF
Scopus (8)
Scopus Crossref
Publication Date
Tue Dec 04 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EVALUATION OF IMPACT OF MARKETING POLICY IN Al-FURAT GENERAL COMPANY FOR CHEMICAL INDUSTRIES AND PESTICIDES: EVALUATION OF IMPACT OF MARKETING POLICY IN Al-FURAT GENERAL COMPANY FOR CHEMICAL INDUSTRIES AND PESTICIDES
...Show More Authors

Marketing is one of the most important pillars on which most industrial and commercial sectors depend on evaluating their performance, improving their financial position, development and economic growth. The presence of effective marketing activities in any industrial or commercial organization (which works to meet the requirements of customers in order to ensure the integration of trading and handling rings with consumers and to ensure the growth of the marketing process regularly and not to retreat) effectively contributes to maintaining the company's position between its competitors and its customers. It is necessary to have these marketing activities in order to meet the requirements of the organization on the one hand and to

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Achieve the internal and external dimensions of corporate social responsibility through the human resources management strategies / case study in the Municipality of Ramadi.
...Show More Authors

The main focus of research is on how to achieve the internal and external dimensions of corporate social responsibility through human resources management strategies, which is a major of research aimed. The main problem of this research was confirmed, which confirms that there is an unclear role for social responsibility, lack of human resources management strategies, and ambiguity of roles in the municipality under study. The diagnose of the problem and determining the gap between the internal and external dimensions of social responsibility and human resources management was identified, which attacked the researcher's attention to navigate in this subject, look for the reasons for the gaps and try to reduce them. The case study

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Monitoring Pollution and the Trend of Air Quality in Brick Factories in the Nahrawan Region and its Impact on Baghdad, Using Remote Sensing Data
...Show More Authors

One of the most significant environmental issues facing the planet today is air pollution. Due to development in industry and population density, air pollution has lately gotten worse. Like many developing nations, Iraq suffers from air pollution, particularly in its urban areas with heavy industry. Our research was carried out in Baghdad's Al-Nahrawan neighbourhood. Recently, ground surveys and remote sensing were used to study the monitoring of air pollution. In order to extract different gaseous and particle data, Earth Data source, Google Earth Engine (GEE), and Geographic Information Systems (GIS) software were all employed. The findings demonstrated that there is a significant positive connection between data collected by ground-ba

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Synthesis and Characterization of Schiff Base Folic Acid Based Ligand and Its Complexes
...Show More Authors

D-mannose sugar was used to prepare [benzoic acid 6-formyl-2, 2-dimethyl-tetrahydrofuro [3, 4-d][1, 3] dioxol-4-yl ester](compound A). The condensation reaction of folic acid with (compound A) resulted in the formation of new ligand [L]. These compounds were characterized by elemental analysis CHN, atomic absorption AA,(FT-IR),(UV-Vis), TLC, ES mass (for electrospray), molar conductance, and melting point. The new tetradentate ligand [L], reacted with two moles of some selected metal ions and two moles of (2-aminophenol),(metal: ligand: 2-aminophenol) at reflux in water medium to give a series of new complexes of the general formula K2 [M2 (L)(HA) 2] where M= Co (II), Ni (II), Cu (II) and Cd (II). These complexes were characterized by eleme

... Show More
Publication Date
Fri Apr 01 2005
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Synthesis and Characterization of Schiff Base Folic Acid Based Ligand and Its Complexes
...Show More Authors

D-mannose sugar was used to prepare [benzoic acid 6-formyl-2,2-dimethyl-tetrahydrofuro[3,4-d][1,3]dioxol-4-yl ester] (compound A). The condensation reaction of folic acid with (compound A) resulted in the formation of new ligand [L]. These compounds were characterized by elemental analysis CHN, atomic absorption A.A, (FT-I.R.), (U.V.-Vis), TLC, E.S. mass (for electrospray), molar conductance, and melting point. The new tetradentate ligand [L], reacted with two moles of some selected metal ions and two moles of (2-aminophenol), (metal : ligand : 2-aminophenol) at reflux in water medium to give a series of new complexes of the general formula K2[M2(L)(HA)2] where M= Co(II), Ni(II), Cu(II) and Cd(II). These complexes were characterized by elem

... Show More
Publication Date
Thu Mar 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and Characterization of Schiff Base Folic Acid Based Ligand and Its Complexes
...Show More Authors

       D-mannose sugar was used to prepare [benzoic acid 6-formyl-2,2-dimethyl-tetrahydrofuro[3,4-d][1,3]dioxol-4-yl ester] (compound A). The condensation reaction of folic acid with (compound A) resulted in the formation of new ligand [L]. These compounds were characterized by elemental analysis CHN, atomic absorption A.A, (FT-I.R.), (U.V.-Vis), TLC, E.S. mass (for electrospray), molar conductance, and melting point. The new tetradentate ligand [L], reacted with two moles of some selected metal ions and two moles of (2-aminophenol), (metal : ligand : 2-aminophenol) at reflux in water medium to give a series of  new complexes of the general formula K2[M2(L)(HA)2]  where M= Co(II), Ni(II), Cu(II) an

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 02 2021
Journal Name
Iraqi Journal Of Science
An Approach Based on Decision Tree and Self-Organizing Map For Intrusion Detection
...Show More Authors

In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Transfer Learning Based Traffic Light Detection and Recognition Using CNN Inception-V3 Model
...Show More Authors

Due to the lack of vehicle-to-infrastructure (V2I) communication in the existing transportation systems, traffic light detection and recognition is essential for advanced driver assistant systems (ADAS) and road infrastructure surveys. Additionally, autonomous vehicles have the potential to change urban transportation by making it safe, economical, sustainable, congestion-free, and transportable in other ways. Because of their limitations, traditional traffic light detection and recognition algorithms are not able to recognize traffic lights as effectively as deep learning-based techniques, which take a lot of time and effort to develop. The main aim of this research is to propose a traffic light detection and recognition model based on

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref