Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
African Journal Of Hospitality, Tourism And Leisure
An analytical study of the strategic flexibility variation as a function of the dynamic capabilities based on supply chain management (Case study: The General Petroleum Products Distribution Company in Baghdad)
...Show More Authors

Scopus (9)
Scopus
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Evaluation of Holy Quran & Islamic Education Curriculum of Second Intermediate Stage from Perspectives of Teachers & Supervisors of the Material:A Field Study conducted in the Directorates-General of Education in Baghdad Governorate: أشواق عبـد الحـسن عبـد
...Show More Authors

Evaluation of “Holy Quran & Islamic Education” Curriculum for Second Intermediate Stage from Perspectives of Teachers & Supervisors of material A Field Study conducted in the Directorates-General of Education in Baghdad Governorate. It goes without saying that educational curricula for students of all stages of schooling are in bad need of reviewing, evaluation and revision. The Islamic education curriculum is no exception, since it is a basic subject that plays a role in developing the individual’s moral and conscientious aspects, promotes his/her inner discipline and helps establish coherence with the values system of the community to which he/she belongs.

Based on the foregoing, the evaluation process of

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 16 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Technological Maturity and its role in reinforcing the quality of auditing: An analytical study in Iraqi audit offices
...Show More Authors

This paper discusses the role of Auditors' Technological Maturity in reinforcing the quality of auditing profession, through focusing on the concepts of Technological Maturity and quality of auditing profession, as well as designing a proposed model for Technological Maturity which includes five evolutionary and sequential stages, and this proposed model would contribute to reinforce the quality of auditing. This proposed model will be employed in the field of auditing profession because the importance of the development and investment in this profession and the importance of the need for specialized knowledge in Information Technology, and the result of a proposed model is development of technological knowledge for the auditor to reach

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimating and Analyzing Food Security Indicators in Selected Arab Countries for the Period (1996 - 2012)
...Show More Authors

        The study hypothesize that the majority of Arab countries  show a poor agricultural economic efficiency which resulted in a weak productive capacity of wheat in the face of the demand, which in turn led to the fluctuation of the rate of self-sufficiency and thus increase the size of the food gap. The study aims at estimating and analyzing the food security indicators for their importance in shaping the Arabic agricultural policy, which aims to achieve food security through domestic production and reduce the import of food to less possible extent. Some of the most important results reached by the study were that the increase in the amount of consumption of wheat in the countries of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Slums and its implication on security in Baghdad
...Show More Authors

The research team seeks to study the phenomena of random housing in Iraqi society in general and Baghdad city in particular by standing on the causes behind this phenomena and its relation with security situation in Baghdad. The researchers adopted a theoretical and practical framework. The main objective is to diagnose the risks caused by the escalation of slums in Baghdad city. 

View Publication Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
International Journal Of Drug Delivery Technology
. Preparation and Characterization of Atorvastatin Calcium Trihydrate-cyclodextrin Inclusion Complex
...Show More Authors

Atorvastatin calcium (ATR) is an antihyperlipidemic agent used for lowering blood cholesterol levels. However, it is very slightly soluble in water with poor oral bioavailability, which interferes with its therapeutic action. It is classified as a class II drug according to Biopharmaceutical Classification System (low solubility and high permeability).

View Publication Preview PDF
Scopus (6)
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Equity financing within the framework the signal theory and its reflection on prices of stocks avarege: an empirical study in the Iraq stock exchange
...Show More Authors

 Since there is no market for bond issuance by companies in the Iraqi market and the difficulty of borrowing, companies must resort to proprietary financing to finance their investments. However, in the framework of the literature of financial management, the type of financing used by the company sends signals to investors and therefore reflected on the market value. Therefore, the problem of the study revolves around the variables of the study (Equity financing within the framework the signal theory, price of common stock in the Iraqi market).     

The study aims to verify the impact of the capital increase through the issuance of new stock on the price of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
International Journal Of Computer Trends And Technology
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Engineering
Bit Record Analysis for Bits Evaluating and Selection
...Show More Authors

The bit record is a part from the daily drilling report which is contain information about the type and the number of the bit that is used to drill the well, also contain data about  the used weight on bit  WOB ,revolution per minute RPM , rate of penetration ROP, pump pressure ,footage drilled and bit dull grade. Generally we can say that the bit record is a rich brief about the bit life in the hole. The main purpose of this research is to select the suitable bit to drill the next oil wells because the right bit selection avoid us more than one problems, on the other hand, the wrong bit selection cause more than one problem. Many methods are related to bit selection, this research is familiar with four of thos

... Show More
View Publication Preview PDF