Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
Translation Techniques In Reproducing The Semantics Of Russian Political Terms: Переводческие Приемы В Воспроизведении Семантики Русскоязычных Политических Терминов
...Show More Authors

 Political terminology differs from any other type of terminology not only in the presence of political terminology, but also in content, structure, functions and the recipient who perceives it. Taking this into account, it is inappropriate to consider the semantic difficulties of translating Russian-language political terms solely at the semantic level. In our opinion, it is inextricably linked with the lexical, syntactic and grammatical levels. If we combine all 4 levels, then the following translation techniques can be distinguished: lexical borrowing (transcription / transliteration, tracing); modulation; generalization / concretization; omission / addition; descriptive translation; conversion [Komissarov 2013]. One of the most

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
NEGOTIATION SKILLS OF THE EMPLOYEES OF PUBLIC RELATIONS IN THE GOVERNMENT INSTITUTIONS : (Ministry of Electricity and Ministry of Transportation as a Model)
...Show More Authors

This research dealt with the subject of negotiation skills of employees in public relations departments which is one of many skills supposed to be available to these employees. These skills combined help in the success of the job of public relations departments; and give them an important and vital role within the roles distributed in the departments of any government institution wither is governmental or non-governmental.

Negotiation is a skill that requires intelligence, tact, culture, information, intuition, and knowing to use the means of communication to access the information that is useful in reaching satisfactory results

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Advance Science And Technology
MR Images Classification of Alzheimer's Disease Based on Deep Belief Network Method
...Show More Authors

Background/Objectives: The purpose of this study was to classify Alzheimer’s disease (AD) patients from Normal Control (NC) patients using Magnetic Resonance Imaging (MRI). Methods/Statistical analysis: The performance evolution is carried out for 346 MR images from Alzheimer's Neuroimaging Initiative (ADNI) dataset. The classifier Deep Belief Network (DBN) is used for the function of classification. The network is trained using a sample training set, and the weights produced are then used to check the system's recognition capability. Findings: As a result, this paper presented a novel method of automated classification system for AD determination. The suggested method offers good performance of the experiments carried out show that the

... Show More
Publication Date
Mon Mar 15 2021
Journal Name
Al-academy
Making use of economical design techniques and materials in implementing cosmetic supplements to the interior spaces of the dwelling: رانيه علي احمد عبد الرحمن
...Show More Authors

  This research aims to identify the economic design techniques and materials that can be used in the implementation of cosmetic supplements to the spaces of the dwelling. The research relied on the descriptive and analytical approach by describing and analyzing models of design techniques and materials that can be used in the production of cosmetic supplements in the interior spaces of the dwelling.
The results of the research concluded that the beautification of the spaces of the dwelling is one of the necessary and important pieces to add aesthetic touches to the internal spaces, and that the use of economic design techniques and materials contributes to the implementation of many pieces of complementary beautification of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
تقنيات شبكة المعلومات ودورها في إنجاز عمليات الشراء الالكتروني والتسويق الالكتروني* دراسة حالة في شركة بغداد للمشروبات الغازية- المساهمة المختلطة
...Show More Authors

Information Technology has become one of the Most Prominent tools in the Era of Technology and Telecommunication of our Digital World. For that Reasons most Organizations had taken the tools Adapted to their Present and Future Directions and for the Improvement for it's Operations and Workability in Internal or External Enviroment. Consequently the Points of Strength Beats the Weakness and as Result of Increase Opportunities and Decrease the Threats Facing these Organizations. This Search has been made to test the Existence or not Existence role of the Information Network Technologies that Include {Internet and Extranet} in Application of Information Technology t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 17 2022
Journal Name
Aip Conference Proceedings
Principles of using project management tools and techniques of mitigate components causing delays and disruption in public and private construction projects in Iraq
...Show More Authors

Delays and disruption are a common issue in both community and personal building programs The problem exists all throughout the world, but it is particularly prevalent in Iraq, where millions of dollars are squandered each time as a outcome. Delays and interruptions may have serious consequences not just for Iraq's construction plans, but also for the country's economic and social status. While numerous studies have been conducted to investigate the factors driving delays and disruption in Iraqi construction projects, slight consideration has been given to by what means project management implements and approaches have affected the occurrence of project delays and disruption. After analyzing the crucial reasons for delays and instability in

... Show More
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Prepare Maps For Greenhouse Gases With Some Weather Elements For Baghdad City Using Data Observation And Arc-GIS Techniques
...Show More Authors
Abstract<p>Air pollution refers to the release of pollutants into the air that are detrimental to human health and the planet as a whole.In this research, the air pollutants concentration measurements such as Total Suspended Particles(TSP), Carbon Monoxides(CO),Carbon Dioxide (CO2) and meteorological parameters including temperature (T), relative humidity (RH) and wind speed & direction were conducted in Baghdad city by several stations measuring numbered (22) stations located in different regions, and were classified into (industrial, commercial and residential) stations. Using Arc-GIS program ( spatial Analyses), different maps have been prepared for the distribution of different pollutant</p> ... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 15 2021
Journal Name
المجلة العربية للبحوث الادبية والانسانية
Service Leadership and Customer Satisfaction Under COVID-19 Pandemic Crisis : An Empirical Research for Leaders of Public Organizations in Iraq
...Show More Authors

The current research aims to identify the degree to which a sample of managers in public organizations appreciated the level of application of the service leadership style from their point of view, and its relationship to the customer satisfaction index in light of the (Covid-19) pandemic, to achieve this, the researcher followed the experimental approach by applying a questionnaire that included two axes, The first: to measure the level of service leadership according to the scale (D. Van Dierendonck and I. Nuijten, 2011), which includes (8) dimensions (empowerment, stand back, accountability, courage, forgiveness, Authenticity, humility, stewardship). The second axis: to measure the level of customer satisfaction according to (Askim, 2004

... Show More
Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
...Show More Authors

Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref