Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 02 2022
Journal Name
المجلة العراقية للمعلومات
Social Networking sites and their role in publishing Scientific knowledge
...Show More Authors

The current research aims to highlight the role of social networking sites in the dissemination of scientific knowledge and the importance of their use by researchers, and the researcher relied on the descriptive approach and the survey method. Among the data collection tools are the questionnaire and paper and electronic sources. Among the most important results that the research came out with: The number of the subscribers’ sites was (14) sites, and the most used social sites for receiving and Disseminating Scientific knowledge are: Facebook, Telegram, WhatsApp, Viber, Messenger and YouTube. All respondents receive tacit knowledge (Exchange of Messages and News) through social networking sites, and few of them do not receive explicit kn

... Show More
Preview PDF
Publication Date
Sun Jun 27 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Quality of Nursing Care Services Provided to Children under Five Years Based on Integrated Management of Child Health at Primary Health Care Centers in Baquba City
...Show More Authors

Objective(s): The study aims to evaluating the quality of nursing care provided to children under five years to compare between quality related to type of health sectors; to determine the quality of nursing care and to compare between such care in Baquba Health Care Sector I and II.

Methodology: A descriptive study is carried out for the period from December 15th 2019 to May 1st 2020. A purposive "non- probability" sample, of (60) staff nurse and (60) children is selected. An adopted questionnaire has been selected for the study which consists of three parts. The first part is nurses’ socio-demographic characteristic; the second part is ch

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 23 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The use of property sampling reduce of the Audit dangerous of auditor judgmentsApplied Research in Board of supreme Audit: Applied Research in Board of supreme Audit Accounts of the State Company for Cotton industries
...Show More Authors

This research aims to clarify the advantages of statistical sampling method and provided the scientific basis of the auditor was able to defend the future of any objection to the validity of his opinion on the financial statements of the restrictions of personal rule as much as possible during the stages of the general Company for Cotton industries.Aresearc An applied study in the Board of supreme Audit  (the accounts of the cotton industry), have been used, a researcher at the theoretical side to achieve the objectives of the research methodology descriptive inference in the collection and analysis of financial statements of the circle (sample) for the financial year (2008). To achieve the objectives of the field study was designed

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Impact of Applying the Percentage of Complete Method or the Complete Contract One on the Taxation of the Long – Term Construction Contracts: بحث تطبيقي في الهيئة العامة للضرائب – قسم الشركات
...Show More Authors

The research aims to shed light on the amount of proceeds annual tax for each of the way the contract total and percentage of completion method - see which is better - as well as the current problems arising from the application method of the contract in full in settling accounts tax - to identify problems - related to postpone settling accounts tax in accordance with the way the contract fully and determine the advantages and disadvantages of each of the methods through practical application , and then use the results as inputs to help in the decision to confirm the continuation of the GCT using a full decade in settling accounts tax for long-term construction contracts or forgo them.

Were the result of research the existence of

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2005
Journal Name
مجلة مداد كلية الاداب الجامعة العراقية
الامشطة الاتصالية للعلاقات العامة في المؤسسات الدينية العراقية ,دراسة تحليلية في الإصدارات الصحفية في دواوين الأوقاف الدينية للمدة من (1 /12 / 2009م - 30 / 6 / 2010م ).
...Show More Authors

تعد أنشطة العلاقات العامة تمثل جانباً مهماً من جوانب عمل المؤسسات بشكل عام في الوقت الحاضر، وتأخذ خصوصية أكثر في المنظمات الحكومية، بسبب الأعباء الضخمة والمسؤوليات العديدة تجاه أفراد المجتمع، وقد اهتمت الدول المتقدمة والنامية على حد سواء بهذا النشاط. إن أنشطة العلاقات العامة تؤدي دوراً هاماً في تسهيل عملية الاتصال وتحقيق الفهم المتبادل وتوطيد العلاقة بين الطرفين – المؤسسة والجمهور – وللعلاقات العامة دور

... Show More
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
African Journal Of Hospitality, Tourism And Leisure
An analytical study of the strategic flexibility variation as a function of the dynamic capabilities based on supply chain management (Case study: The General Petroleum Products Distribution Company in Baghdad)
...Show More Authors

Scopus (9)
Scopus
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Evaluation of Holy Quran & Islamic Education Curriculum of Second Intermediate Stage from Perspectives of Teachers & Supervisors of the Material:A Field Study conducted in the Directorates-General of Education in Baghdad Governorate: أشواق عبـد الحـسن عبـد
...Show More Authors

Evaluation of “Holy Quran & Islamic Education” Curriculum for Second Intermediate Stage from Perspectives of Teachers & Supervisors of material A Field Study conducted in the Directorates-General of Education in Baghdad Governorate. It goes without saying that educational curricula for students of all stages of schooling are in bad need of reviewing, evaluation and revision. The Islamic education curriculum is no exception, since it is a basic subject that plays a role in developing the individual’s moral and conscientious aspects, promotes his/her inner discipline and helps establish coherence with the values system of the community to which he/she belongs.

Based on the foregoing, the evaluation process of

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 16 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Technological Maturity and its role in reinforcing the quality of auditing: An analytical study in Iraqi audit offices
...Show More Authors

This paper discusses the role of Auditors' Technological Maturity in reinforcing the quality of auditing profession, through focusing on the concepts of Technological Maturity and quality of auditing profession, as well as designing a proposed model for Technological Maturity which includes five evolutionary and sequential stages, and this proposed model would contribute to reinforce the quality of auditing. This proposed model will be employed in the field of auditing profession because the importance of the development and investment in this profession and the importance of the need for specialized knowledge in Information Technology, and the result of a proposed model is development of technological knowledge for the auditor to reach

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimating and Analyzing Food Security Indicators in Selected Arab Countries for the Period (1996 - 2012)
...Show More Authors

        The study hypothesize that the majority of Arab countries  show a poor agricultural economic efficiency which resulted in a weak productive capacity of wheat in the face of the demand, which in turn led to the fluctuation of the rate of self-sufficiency and thus increase the size of the food gap. The study aims at estimating and analyzing the food security indicators for their importance in shaping the Arabic agricultural policy, which aims to achieve food security through domestic production and reduce the import of food to less possible extent. Some of the most important results reached by the study were that the increase in the amount of consumption of wheat in the countries of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref