Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Modern Sport
Vertical Resistance and Its Relationship with Speed-Strength and Biomechanical Variables During the Takeoff Phase and the Performance of Selected Activities in Individual and Team Sports
...Show More Authors

Jumping ability is a fundamental variable in many sports, as its execution requires an integration of muscular strength Q1 and certain biomechanical variables. This is particularly evident in gymnastics jumping events and jump shots in ball games, both of which rely on a high level of vertical resistance. Vertical resistance serves as an indicator of an athlete’s ability to overcome their body weight while counteracting gravitational force to achieve optimal performance. As such, it is considered one of the key factors in movements that demand explosive power and speed. The researchers believe that despite the significant relationship between vertical resistance, speed-strength of the arms and legs, and certain biomechanical varia

... Show More
View Publication
Crossref
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
Social Safety Nets and Sustainable Development in Fragile Environments: A Field Social Study of Slums in the City of Baghdad/Al-Karkh: هبة صالح مهدي, عدنان ياسين مصطفى
...Show More Authors

Almost human societies are not void of poverty, as the latter accompanied the emergence of humanity, and it, thus, represents an eternal problem. To advance an individual's reality and raise the level of the poor social classes, social security networks have been established. Such networks operate in society following social systems and laws to provide food, and material support. Besides, such networks help to rehabilitate the individual academically and vocationally. They empower vulnerable groups through the establishment of courses and workshop, provide (conditional) subsidies related to the health and educational aspects in order to achieve the sustainable development goals of (2030), and apply developmental roles of social safety ne

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow in Wired Networks
...Show More Authors

<p>The demand for internet applications has increased rapidly.  Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Knowledge value added methodology between theory and application Comparative filed research in some of the Iraqi private banks
...Show More Authors

Abstract

        The research to have a clear perceptions about the knowledge value added to assess the knowledge resources of the Iraqi private banks, depending on the value added methodology of the proposed defined (Housel & Bell, 2001), which assumes that the  knowledge value added come through synergetic relationship between knowledge resource and information technology, trying to the possibility of mainstream theory and its application in the Iraqi environment and interpretation of results, and on this basis was launched search of a research problem took root synergetic nature of the relationship between knowledge (human)  resource and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 06 2014
Journal Name
Journal Of Educational And Psychological Researches
Phenomenon repercussions Globalization on pedagogical action and Educational in Arab society
...Show More Authors

Globalization as phenomena has affected   all aspects of life and reflected its impacts to the Arab world politically, economically, and culturally and became a vital field that related directly to our life. This field of searching needs as many studies and Academics as for employing the means that needed to face a national challenge which targeting the Arabic man Character in its ethics and values. This very important thing needs a very important reaction to face that challenge to protect the cultural ARABIC & ISLAMIC characteristics and to take care of education in all its levels and   forms as it is an invincible fort. For that, this field has become as the priority of the studying and researches if the

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Hawiyyah Journal
Translation and Paratext
...Show More Authors

Publication Date
Fri Jul 01 2016
Journal Name
Al–bahith Al–a'alami
Semiotics and Communication
...Show More Authors

Verbal Communication is linked with the social event no matter how different Communities in their cultures and styles of living and it's intuitions and political systems remain involved in its need . It is a dialogue , a pillar of human Communication , all Communication process conditional on the where a bouts of the shrine and the cycle of words . Semiotics is based on two principles important to Communicate : one : offer intended to report to the speaker . And the other : The recipient of the message a (know led gment of this intent . And learn to measure intent rely on two types of units ; first is the evidence for which is available for reporting the intent and the other : Signals . semiotics Communicate evidence bother as a channel

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Hawiyyah (identity) Journal
Frued and Sufisim
...Show More Authors

Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
synthesis and characterization
...Show More Authors

chloride or poluacrulic acid with different primary amines to mesuring==================================638one hundred three patinents with rheumatic symptoms were include in this study and their sera tested for

View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Violence and Islam
...Show More Authors

Most of the texts of Islamic law provide for the payment of damage and the denial of the human ... Damage of all kinds of material and moral, which is in the harm that affects the human being in himself or his offer or money or other affairs respected by Sharia. A person can defend himself, his mind, his religion, his offer and his money (the five imperatives) as much as he can. Islam rejects violence directed without a legitimate right and does not endorse aggression against others. Violence has been defined in language as a lack of compassion or against it or is a reprimand, bashing, and the blame ... It is in psychology: human behavior tainted by cruelty, oppression, and aggression, and is defined politically: it is deliberate civil d

... Show More
View Publication Preview PDF