Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Extent of Fulfilling Total Quality Standards by Applied Sciences Colleges in the University of Technology and Applied Sciences in Light of the National Strategy of Education 2040 in the Sultanate Of Oman.
...Show More Authors

Abstract

The study aims to identify the extent to which the applied colleges at the University of Technology and Applied Sciences meet the comprehensive quality standards in light of the national education strategy for the 2040 Vision in the Sultanate of Oman. To do this, the researchers used the descriptive approach. They used a questionnaire as a tool for data collection that was applied to (237) administrators, academics, and support functions. The study found that the extent to which the applied colleges at the University of Technology and Applied Sciences meet the comprehensive quality standards in the light of the National Education Strategy 2040 in the Sultanate of Oman recorded a high range. The study als

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 04 2923
Journal Name
Journal Of Sustainable Studies
Enantiosemy in a Comparative Aspect: On the Material of Modern Russian and Arabic Languages Энантиосемия в сравнительном аспекте: На материале современного русского и арабского языков التضاد - دراسة مقارنة : اللغات الروسية والعربية الحذيثة أنمورجا
...Show More Authors

This work is devoted to a comparative study of the phenomenon of enantiosemy in Russian and Arabic.Everyone knows the term antonyms - words of the same part of speech, opposite in meaning, such as: Day and night, white and black, truth and lies. But in Russian, Arabic and other languages there is an interesting phenomenon, which consists in the fact that one word has two opposite meanings. Such a phenomenon in linguistics is called enantiosemy (from the Greek words enantios - "opposite" and sema - "sign")

Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The compatibility of the Development Fund for Iraq to the requirements of sovereign wealth funds An analytical study of the legal framework and institutional structure in accordance with the standards of the Santiago
...Show More Authors

Sovereign wealth funds have attracted the attention of the governments of the oil and non-oil countries alike, with a variation of the size of those funds to those states, based on the size of the financial surpluses resulting from Alriadat oil or foreign reserves, or state revenues for other sovereign assets. Raj use these funds remarkably during the financial crises the world has seen, including the crisis of 2008-2007., And Iraq is a oil-producing countries, which has the third largest reserves of crude oil (Crude Oil) at the level of the Arab world and of 140 300)) million barrels after Saudi Saudi Arabia and the Islamic Republic of Iran, and the fourth reserves of crude oil in the world after issued Venezuela to the reserve

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 25 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the extent to which listed companies comply with sustainability accounting standards by improving performance and financial reporting to enhance confidence in financial statements: بحث تطبيقي مقارن في عينة من الشركات العراقية والعربية
...Show More Authors

The objective of this research is to know the extent to which Iraqi and Arab companies apply the criteria of accounting for sustainability and disclosure, as well as to analyze the content of the annual financial reports of the companies listed in the financial market to determine their compliance with the Sustainability Accounting Standards Board )SASB(. Annual Report The commitment of telecommunications companies to implement sustainability issues related to the standard of telecommunications services reached a general average of (54%) for the sample of the research sample. This means that there is a degree of admissibility in applying the standard. As well as the highest level of reporting to the criterion of the (Jordan Telec

... Show More
View Publication Preview PDF
Publication Date
Sun May 02 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Application of banking institutions' governance variables and their impact on financial performance as measured by (ROA & ROE): an applied study on a sample of local Islamic banks listed on the Iraq Stock Exchange
...Show More Authors

The research seeks to achieve its goal of demonstrating the impact of applying banking governance variables on the financial performance of Islamic banks, and the independent research variables are represented by (X) by (the number of independent members in the board (X1), the number of directors in the board (X2), the number of committees emanating from the board ( X3), the percentage of shares owned by major shareholders in the board (X4), the number of members of the Sharia supervisory board (X5)), and the dependent variable (Y) is represented by (rate of return on assets (Y1), rate of return on equity (Y2)).

The research sample included (4) Islamic banks, namely (Iraqi Islamic Bank, National Islamic Bank, Jihan Islamic Bank,

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Engineering
Planning of Distribution Networks in Baghdad City
...Show More Authors

Planning of electrical distribution networks is considered of highest priority at the present time in Iraq, due to the huge increase in electrical demand and expansions imposed on distribution networks as a result of the great and rapid urban development.

Distribution system planning simulates and studies the behavior of electrical distribution networks under different operating conditions. The study provide understanding of the existing system and to prepare a short term development plan or a long term plan used to guide system expansion and future investments needed for improved network performance.

The objective of this research is the planning of Al_Bayaa 11 kV distribution network in Baghdad city bas

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimate AR(3) by Using Levinson-Durbin Recurrence & Weighted Least Squares Error Methods
...Show More Authors

In this study, we investigate about the estimation improvement for Autoregressive model of the third order, by using Levinson-Durbin Recurrence (LDR) and Weighted Least Squares Error ( WLSE ).By generating time series from AR(3) model when the error term for AR(3) is normally and Non normally distributed and when the error term has ARCH(q) model with order q=1,2.We used different samples sizes and the results are obtained by using simulation. In general, we concluded that the estimation improvement for Autoregressive model for both estimation methods (LDR&WLSE), would be by increasing sample size, for all distributions which are considered for the error term , except the lognormal distribution. Also we see that the estimation improve

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Video Image Compression Using Absolute Moment Block Truncation Method with Orthogonal Search Motion Estimation Technique
...Show More Authors

Image compression has become one of the most important applications of the image processing field because of the rapid growth in computer power. The corresponding growth in the multimedia market, and the advent of the World Wide Web, which makes the internet easily accessible for everyone. Since the early 1980, digital image sequence processing has been an attractive research area because an image sequence, as acollection of images, may provide much compression than a single image frame. The increased computational complexity and memory space required for image sequence processing, has in fact, becoming more attainable. this research absolute Moment Block Truncation compression technique which is depend on adopting the good points of oth

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 02 2022
Journal Name
Turkish Journal Of Computer And Mathematics Education (turcomat)
Mpeg-Dash System via HTTP2 Protocol with HEVC Encoder for Video Streaming Services
...Show More Authors

MPEG-DASH is an adaptive bitrate streaming technology that divides video content into small HTTP-objects file segments with different bitrates. With live UHD video streaming latency is the most important problem. In this paper, creating a low-delay streaming system using HTTP 2.0. Based on the network condition the proposed system adaptively determine the bitrate of segments. The video is coded using a layered H.265/HEVC compression standard, then is tested to investigate the relationship between video quality and bitrate for various HEVC parameters and video motion at each layer/resolution. The system architecture includes encoder/decoder configurations and how to embedded the adaptive video streaming. The encoder includes compression besi

... Show More
View Publication Preview PDF