Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
The bodies responsible for the organization of accounting in the world seek to keep abreast of repaid development, by provide the information required by users, which they need to make efficient decision that return them to the desired benefits, and avoid the risks they could face if they made their decision based on misleading information, or insufficient, or not accurate, Hence, the IASB has undertaken to review the standards, and make the necessary adjustment and clarifications to remove the ambiguities that some of the paragraphs may have in IFRS issued.
And the Iraqi Central Bank obliges banks to convert from local accounting standards to apply IFRS only a step towards keeping pace with developments
... Show MoreThe research aimed to study the role that the media play in shaping the public knowledge of human rights issues among the people of Kirkuk, which will be the focus of the study. The research was conducted by applying a survey panel to a random sample of the city's audience. The research dealt with the theoretical aspect of a theory that relied on the media, and the loans provided by the theory, on the basis of which the research was conducted and the research problem was determined based on a major question: What is the role that the mass media play in developing the knowledge of members of the public on human rights and the relationship between the intensity of view in that, as well as the identification of the effect of two variables G
... Show Moretock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.
Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show Moreيهدف البحث الى قياس مدى التطبيق والتبني للقيادة الملهمة في المنظمات العامة، وقد اشتقت مشكلة البحث النظرية من وجود فجوة معرفية وذلك لقلة الدراسات والبحوث التي تناولت متغير البحث بأبعاده (الرؤية المستقبلية، الثقة بالنفس، تمكين العاملين، ادارة التغيير)، واعتمد البحث المنهج التحليلي عن طريق استعمال الاستبانة في المنظمة التي تم اختيارها وذلك لكونها تعد من المنظمات الاساسية في تقديم الخدمات التعليمية المهمة في
... Show Moreالاوضاع العامة ليهود العراق قبل الهجرة القانونية
ان استعمال الاساليب والنظريات العلمية الحديثة في عمل العلاقات العامة من شأنه ان يجعل عمل ادارات العلاقات العامة نافعاً ومؤثراً نافعاً للمؤسسة ومؤثراً في جمهورها ومحيطها الخارجي وكلما اتسع نشاط المؤسسة وكبر حجمها وامتدت الرقعة الجغرافية التي تنتشر عليها تشكيلات المؤسسة وفروعها كلما كبرت وكثرت التحديات والتهديدات التي تواجه المؤسسة ونشاطها وبذلك تكون الحاجة ماسة الى وجود ادارات متخصصة بالعلاقات العامة تس
... Show MoreSummary:
This research revolves around the probing of those whom Ibn Hajar said, "He has a vision", its significance, and the ruling on the connection and transmission to it. The number of narrators reached fifty-one (51) narrators, among whom it was said, “He has a vision, whether it is definite or possibly. Some of them had a vision and companionship.”They are eleven (11) narrators, And among them were those who had visions and had no company, and their number was twenty-one (21) narrators, and among them were those who had no vision and nor company, and their number is nineteen (19) narrators.
As a result , whoever said about him “has a vision” and has companions, his hadith is connected, even i
Deposits with the Industrial Bank, together with loans received from others, are non-financial financial resources, which are sources of supply to the Industrial Bank of funds that allow the Bank to expand the granting of loans. The increases in this resource indicates that the bank is practicing comprehensive banking, which is consistent with the nature of the transformation of the banking system towards multiple businesses. Therefore, the research comes to highlight the causality of the trend between total deposits and total loans. And if the causality is found, is it one-way or two-way? How long is the impact?