Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
Improving Customer Value Through the Integral of Techniques Quality Function Deployment and Value Engineering
...Show More Authors

Health service institutions suffer from challenges resulting from the great changes that our world is witnessing today.  This has affected the value that these institutions add to the patient.

This research aims to identify the effect of integrating each of the techniques of QFD and value engineering for the health services provided to the patient to improve the value for him and thus obtain his satisfaction, which is reflected in the reputation of the surveyed hospitals. To achieve this, the descriptive analytical method was used, and a questionnaire was designed to collect the necessary data, which represents a measure of this research. The questionnaire was distri

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Nurses' Knowledge About Chest Physiotherapy Techniques for Patients With Corona Virus Disease
...Show More Authors

Abstract

Objective(s): A descriptive study aimed to determine nurses' knowledge about chest physiotherapy techniques for patients with Corona virus disease and observe the relationship between nurses' knowledge and their socio-demographic characteristics.

Methodology: The study was directed in isolation units of Al- Hussein teaching hospitals in Thi-Qar, Iraq for the period from June 1st,  2022 to November 27th, 2022. Non- probability (purposively) sample comprised 41 nurses. A questionnaire was used for data collection and it consists of two parts: the first part comprises socio demographic features, the second part includes self- administered questionnaire sheet wa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Joint Source-Channel Coding for Wireless Image Transmission based OFDM-IDMA Systems
...Show More Authors

The source and channel coding for wireless data transmission can reduce
distortion, complexity and delay in multimedia services. In this paper, a joint sourcechannel
coding is proposed for orthogonal frequency division multiplexing -
interleave division multiple access (OFDM-IDMA) systems to transmit the
compressed images over noisy channels. OFDM-IDMA combines advantages of
both OFDM and IDMA, where OFDM removes inter symbol interference (ISI)
problems and IDMA removes multiple access interference (MAI). Convolutional
coding is used as a channel coding, while the hybrid compression method is used as
a source coding scheme. The hybrid compression scheme is based on wavelet
transform, bit plane slicing, polynomi

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 05 2018
Journal Name
International Journal Of Science And Research (ijsr)
Image Steganography Based on Discrete Wavelet Transform and Chaotic Map, IJSR, Call for Papers, Online Journal
...Show More Authors

'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal

View Publication
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Techniques of Directorial Narration in Iraqi Theatre Show: سيف الدين عبد الودود عثمان
...Show More Authors

            The concept of narration has taken an aesthetic field farther than the primitive human act which was imposed by the necessities of social communication in an ancient historical period. The research addressed the research problem. The importance of the research lies in connecting the concept of narration with the theatre directing elements. The research aims at discovering the narration fields in the theatre directing represented by the perceived videos, audios and motions. The research time limit was (2014).  The theoretical framework is divided into three chapters:

The first chapter (the concept of narration in literature and criticism), the second addressed

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
High Transaction Rates Performance Evaluation for Secure E-government Based on Private Blockchain Scheme
...Show More Authors

 

The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (12)
Scopus Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
Printmaking Techniques to Enable People with Visual Impairment to Taste Print Artworks
...Show More Authors

The study aims to integrate the visually impaired people into the art connoisseur community through producing special print artworks to enable the visually impaired people to use their other senses to feel artworks by using artistic printing techniques through adding some prominent materials to the printing colors or making an impact that visually impaired people can perceive using their other senses. This study also aims to set up art exhibitions that display tangible works that can enable visually impaired people to feel artwork and understand its elements to enable them to feel it through other senses.
The study follows the experimental method, through using artistic printing techniques, which allow printing with prominent textur

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Engineering
Development of Spatial Data Infrastructure based on Free Data Integration
...Show More Authors

In recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of how the

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Engineering
Development of Spatial Data Infrastructure based on Free Data Integration
...Show More Authors

In recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho

... Show More
Crossref