Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 19 2021
Journal Name
Isprs International Journal Of Geo-information
The Potential of LiDAR and UAV-Photogrammetric Data Analysis to Interpret Archaeological Sites: A Case Study of Chun Castle in South-West England
...Show More Authors

With the increasing demands to use remote sensing approaches, such as aerial photography, satellite imagery, and LiDAR in archaeological applications, there is still a limited number of studies assessing the differences between remote sensing methods in extracting new archaeological finds. Therefore, this work aims to critically compare two types of fine-scale remotely sensed data: LiDAR and an Unmanned Aerial Vehicle (UAV) derived Structure from Motion (SfM) photogrammetry. To achieve this, aerial imagery and airborne LiDAR datasets of Chun Castle were acquired, processed, analyzed, and interpreted. Chun Castle is one of the most remarkable ancient sites in Cornwall County (Southwest England) that had not been surveyed and explored

... Show More
View Publication
Scopus (26)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Tue Jan 31 2017
Journal Name
Journal Of Engineering
Determine an Equation to Calculate the Annual Maintenance Cost for Public Hospitals (Al Sader City Hospital as a Case Study)
...Show More Authors

Maintenance of  hospital buildings and its management are regarded as an important subject which needs attention because hospital buildings are service institutions which are very important to a society, requiring the search for the best procedure to develop maintenance in hospitals. The research is aimed to determine an equation to estimate the annual maintenance cost for public hospital. To achieve this aim, Al-Sader City Hospital maintenance system in Al-Najaf province has been studied with its main elements through survey of data, records and reports relating to maintenance during the years of the study 2008-2014 and to identify the strengths, weaknesses, opportunities and threat points in the current system through Swat analysi

... Show More
View Publication Preview PDF
Publication Date
Wed May 04 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Knee Meniscus Segmentation and Tear Detection Based On Magnitic Resonacis Images: A Review of Literature
...Show More Authors

The meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when

... Show More
Publication Date
Mon Sep 07 2020
Journal Name
Environmental Science And Pollution Research
The biosorption of reactive red dye onto orange peel waste: a study on the isotherm and kinetic processes and sensitivity analysis using the artificial neural network approach
...Show More Authors

View Publication
Scopus (35)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Performance evaluation criteria"Applied Study in the General Company for the manufacture of glass and ceramics"
...Show More Authors

Contemporary management is interested in the process of performance assessment  because of its significance in the field of planning and controlling the multiactiveties to attain its goals and uncovering digression of virtual performance after comparing it with the plan or equitable performance.

Digression is analyzed to enable management control centers of authority.

Assessment process significance is closely related by setting definite categories to evaluate the economic activity to know the ability to achieves aims.

This study concentrated on the most important categories that used to evaluate  company understudy with ather categories suggested to complete assessment process.

This study is in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 21 2022
Journal Name
Journal Of Planner And Development
Use of GIS to study spatial analysis of the migration of nineveh governorate residents for the period 2014-2017
...Show More Authors

The Migration is one of the important dynamic population movement phenomena in population studies because of its great impact in changing many demographic characteristics between the region of origin and arrival. And the multiplicity of forms and types according to the different reasons for it and the motives that prompted the population to move, as well as the currents and their size are also different according to the different causes, and here there are many types of migration, and many of them have been studied at the local and regional levels, and as long as the population is in a continuous dynamic movement, other types of migration are generated. (Al Douri, 2015, 230)          &nbs

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
مجلة مداد الاداب
معوقات تطبيق تكنولوجيا المعلومات والاتصالات في كليات جامعة بغداد من وجهة نظر العمداء والمعاونيين
...Show More Authors

هدف البحث التعرف على المعوقات التي تحول دون تطبيق تكنولوجيا المعلومات والاتصالات في كليات جامعة بغداد بأعتبار أن ذلك يمثل مشكلة لابد من الوقوف عندها , ولأهمية مثل هذه المواضيع وضرورة البحث عنها , إذ تحدد مجتمع البحث بالعمداء والمعاونيين في هذه كليات جامعة بغداد للعام الدراسي 2016-2017حيث قام الباحث ببناء اداة خاصة للبحث لغرض الاجابة على هدف البحث الرئيسي ومن خلال أجابات أفراد عينة البحث التي مثلت ما نسبته66% الى ا

... Show More
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (12)
Crossref (5)
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref