Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 15 2021
Journal Name
Al-academy
Making use of economical design techniques and materials in implementing cosmetic supplements to the interior spaces of the dwelling: رانيه علي احمد عبد الرحمن
...Show More Authors

  This research aims to identify the economic design techniques and materials that can be used in the implementation of cosmetic supplements to the spaces of the dwelling. The research relied on the descriptive and analytical approach by describing and analyzing models of design techniques and materials that can be used in the production of cosmetic supplements in the interior spaces of the dwelling.
The results of the research concluded that the beautification of the spaces of the dwelling is one of the necessary and important pieces to add aesthetic touches to the internal spaces, and that the use of economic design techniques and materials contributes to the implementation of many pieces of complementary beautification of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 17 2022
Journal Name
Aip Conference Proceedings
Principles of using project management tools and techniques of mitigate components causing delays and disruption in public and private construction projects in Iraq
...Show More Authors

Delays and disruption are a common issue in both community and personal building programs The problem exists all throughout the world, but it is particularly prevalent in Iraq, where millions of dollars are squandered each time as a outcome. Delays and interruptions may have serious consequences not just for Iraq's construction plans, but also for the country's economic and social status. While numerous studies have been conducted to investigate the factors driving delays and disruption in Iraqi construction projects, slight consideration has been given to by what means project management implements and approaches have affected the occurrence of project delays and disruption. After analyzing the crucial reasons for delays and instability in

... Show More
Crossref
Publication Date
Fri Jan 15 2021
Journal Name
المجلة العربية للبحوث الادبية والانسانية
Service Leadership and Customer Satisfaction Under COVID-19 Pandemic Crisis : An Empirical Research for Leaders of Public Organizations in Iraq
...Show More Authors

The current research aims to identify the degree to which a sample of managers in public organizations appreciated the level of application of the service leadership style from their point of view, and its relationship to the customer satisfaction index in light of the (Covid-19) pandemic, to achieve this, the researcher followed the experimental approach by applying a questionnaire that included two axes, The first: to measure the level of service leadership according to the scale (D. Van Dierendonck and I. Nuijten, 2011), which includes (8) dimensions (empowerment, stand back, accountability, courage, forgiveness, Authenticity, humility, stewardship). The second axis: to measure the level of customer satisfaction according to (Askim, 2004

... Show More
Preview PDF
Publication Date
Tue May 09 2023
Journal Name
Karbala International Journal Of Modern Science
Secure QR-Code Generation in Healthcare
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Prepare Maps For Greenhouse Gases With Some Weather Elements For Baghdad City Using Data Observation And Arc-GIS Techniques
...Show More Authors
Abstract<p>Air pollution refers to the release of pollutants into the air that are detrimental to human health and the planet as a whole.In this research, the air pollutants concentration measurements such as Total Suspended Particles(TSP), Carbon Monoxides(CO),Carbon Dioxide (CO2) and meteorological parameters including temperature (T), relative humidity (RH) and wind speed & direction were conducted in Baghdad city by several stations measuring numbered (22) stations located in different regions, and were classified into (industrial, commercial and residential) stations. Using Arc-GIS program ( spatial Analyses), different maps have been prepared for the distribution of different pollutant</p> ... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Dec 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
تقنيات شبكة المعلومات ودورها في إنجاز عمليات الشراء الالكتروني والتسويق الالكتروني* دراسة حالة في شركة بغداد للمشروبات الغازية- المساهمة المختلطة
...Show More Authors

Information Technology has become one of the Most Prominent tools in the Era of Technology and Telecommunication of our Digital World. For that Reasons most Organizations had taken the tools Adapted to their Present and Future Directions and for the Improvement for it's Operations and Workability in Internal or External Enviroment. Consequently the Points of Strength Beats the Weakness and as Result of Increase Opportunities and Decrease the Threats Facing these Organizations. This Search has been made to test the Existence or not Existence role of the Information Network Technologies that Include {Internet and Extranet} in Application of Information Technology t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
...Show More Authors

Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Image & Video Processing
Enhancement of LBP-based face identification system by adopting preprocessing techniques
...Show More Authors

Face Identification system is an active research area in these years. However, the accuracy and its dependency in real life systems are still questionable. Earlier research in face identification systems demonstrated that LBP based face recognition systems are preferred than others and give adequate accuracy. It is robust against illumination changes and considered as a high-speed algorithm. Performance metrics for such systems are calculated from time delay and accuracy. This paper introduces an improved face recognition system that is build using C++ programming language with the help of OpenCV library. Accuracy can be increased if a filter or combinations of filters are applied to the images. The accuracy increases from 95.5% (without ap

... Show More
View Publication
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref