Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EVALUATION OF INFORMATION LABEL FOR SOME LOCAL PICKLED PRODUCTS AND ESTIMATION OF SODIUM BENZOATE THEREIN: EVALUATION OF INFORMATION LABEL FOR SOME LOCAL PICKLED PRODUCTS AND ESTIMATION OF SODIUM BENZOATE THEREIN
...Show More Authors

ABSTRACT

The study aimed to evaluate the information label of some local pickle products and estimate sodium benzoate therein. 85 samples of locally made pickles were collected from Baghdad city markets and randomly from five different areas in Baghdad it included (Al-Shula, Al-Bayaa, Al-Nahrawan, Al-Taji, and Abu Ghraib), which were divided into groups P1, P2, P3, P4 and P5, respectively, according to those areas,  samples information label was scanned and compared with the Iraqi standard specification for the information card of packaged and canned food IQS 230, the results showed that 25.9% of the samples were devoid of the indication card informa

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 08 2023
Journal Name
Journal Of Planner And Development
Lebanese building law between texts, Application gaps and land scarcity
...Show More Authors

This paper examines the gaps in Lebanese building law as well as the exploitation of contractors, stakeholders, and residents in order to make illegal profits at the expense of The Shape of urban agglomerations and their expansion in cities and rural areas, which is contrary to the principles of sustainable land development. It also emphasizes the amplification of the factors of vertical and horizontal building investments in the implementation of buildings contrary to the license, as well as the burden that this places on the city's resulting infrastructure and ability to absorb the activities and needs of its residents. The study then presents recommendations in the process of transformation in the technique of planning and application

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 18 2019
Journal Name
مجلة الدراسات الدولية
The media message of ISIS: The content of the discourse and the mechanisms of media confrontation. The media message of ISIS: The content of the discourse and the mechanisms of media confrontation.
...Show More Authors

يهدف البحث الى صياغة استراتيجية اعلامية لمواجهة اعلام التنظيمات الارهابية

Preview PDF
Publication Date
Wed Dec 13 2023
Journal Name
2023 3rd International Conference On Intelligent Cybernetics Technology & Applications (icicyta)
GPT-4 versus Bard and Bing: LLMs for Fake Image Detection
...Show More Authors

The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
comparison Bennett's inequality and regression in determining the optimum sample size for estimating the Net Reclassification Index (NRI) using simulation
...Show More Authors

 Researchers have increased interest in recent years in determining the optimum sample size to obtain sufficient accuracy and estimation and to obtain high-precision parameters in order to evaluate a large number of tests in the field of diagnosis at the same time. In this research, two methods were used to determine the optimum sample size to estimate the parameters of high-dimensional data. These methods are the Bennett inequality method and the regression method. The nonlinear logistic regression model is estimated by the size of each sampling method in high-dimensional data using artificial intelligence, which is the method of artificial neural network (ANN) as it gives a high-precision estimate commensurate with the dat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Information And Communication Convergence Engineering
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai

... Show More
Preview PDF
Scopus (7)
Scopus
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Determinants of Investment Allocations in the Agricultural Sector in Iraq : A Comparison Between the Method of least Squares Approach and the errror Correction Model
...Show More Authors

Abstract

                 The research aimed to test the relationship between the size of investment allocations in the agricultural sector in Iraq and their determinants using the Ordinary Least Squares (OLS) method compared to the Error Correction Model (ECM) approach. The time series data for the period from 1990 to 2021 was utilized. The analysis showed that the estimates obtained using the ECM were more accurate and significant than those obtained using the OLS method. Johansen's test indicated the presence of a long-term equilibrium relationship between the size of investment allocations and their determinants. The results of th

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 03 2020
Journal Name
College Of Islamic Sciences
Rulings of magic  and its treatment in Islam
...Show More Authors

Praise be to God, Lord of the worlds, and the best of prayers. He has completed the delivery of our master Muhammad, his family, and all his companions. O God, bring us out from the darkness of illusion, honor us with the light of understanding, open us with knowledge of knowledge, facilitate our morals with dreams, and make us who listen to the saying and follow their best.
And after ..

Since ancient times, magic was mentioned in many books in the history of the civilizations of ancient peoples, where the first emergence of human civilizations, the oldest of which is the Mesopotamian civilization, the Chinese civilization, and the Pharaonic civilization in Egypt, where concepts prevailed based on the charlatans and sorcery an

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 01 2017
Journal Name
2017 9th Computer Science And Electronic Engineering (ceec)
Modelling the power cost and trade-off of live migration the virtual machines in cloud-radio access networks
...Show More Authors

View Publication
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Baghdad Science Journal
A relationship study of coronavirus (COVID-19) infection, blood groups, and some related factors in Iraqi patients
...Show More Authors

Many studies of the relationship between COVID-19 and different factors have been conducted since the beginning of the corona pandemic. The relationship between COVID-19 and different biomarkers including ABO blood groups, D-dimer, Ferritin and CRP, was examined. Six hundred (600) patients, were included in this trial among them, 324 (56%) females and the rest 276 (46%) were males. The frequencies of blood types A, B, AB, and O were 25.33, 38.00, 31.33, and 5.33%, respectively, in the case group. Association analysis between the ABO blood group and D-dimer, Ferritin and CRP of COVID-19 patients indicated that there was a statistically significant difference for Ferritin (P≤0.01), but no-significant differences for both D-dimer and CRP.

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref