Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
Wireless Body Area Sensor Networks (WBASNs) have garnered significant attention due to the implementation of self-automaton and modern technologies. Within the healthcare WBASN, certain sensed data hold greater significance than others in light of their critical aspect. Such vital data must be given within a specified time frame. Data loss and delay could not be tolerated in such types of systems. Intelligent algorithms are distinguished by their superior ability to interact with various data systems. Machine learning methods can analyze the gathered data and uncover previously unknown patterns and information. These approaches can also diagnose and notify critical conditions in patients under monitoring. This study implements two s
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreThat any industrial company that must think about marketing mechanisms and who are the beneficiaries and the pursuit of gain customer satisfaction with access to competitive advantages. Most industrialized our companies from a variety of problems experienced both in the field of production, marketing, or keep up with new developments or commitment to quality standards, which caused the reluctance of customers to buy local products for various reasons, and especially in light of unplanned economic policy and exposure to market to imported products flooding the market with various goods and services that do not can the domestic industry rival, which has competitive advantages and meet business requirements, but others arrived to stop or as
... Show MoreThe aim of this paper is to know the persuasive methods and public relations strategies in building the reputation of the United Arab Emirates, since the UAE is progressing among the international indicators in good reputation. The researcher used the survey method, using the content analysis tool, to analyze the publications of the UAE Ministry of Foreign Affairs and International Cooperation for the period from 10/1/2021 to 12/31/2021.The researcher reached a set of results, the most important of which are: The UAE Foreign Ministry relied on public relations strategies in order to build a good reputation for the country, as it focused on the media strategy and gave little importance to the consensus-building strategy, as well as focuse
... Show More
This research aims to study the impact of strategic information systems on the development of intellectual capital in the Public Shareholding Electricity Distribution Company in the Hashemite Kingdom of Jordan. To achieve the objectives of the study, a questionnaire was developed for the purpose of data collection, as the number of valid questionnaires for analysis was about (135), and SPSS and AMOS 0.26 software was used to analyze the collected data. The study found out that the respondents' perceptions of the level of importance of strategic information systems and the level of importance of intellectual capital were high, and that the relational capital has ranked as first, followed by structural capital, and h
... Show MoreAerial Robot Arms (ARAs) enable aerial drones to interact and influence objects in various environments. Traditional ARA controllers need the availability of a high-precision model to avoid high control chattering. Furthermore, in practical applications of aerial object manipulation, the payloads that ARAs can handle vary, depending on the nature of the task. The high uncertainties due to modeling errors and an unknown payload are inversely proportional to the stability of ARAs. To address the issue of stability, a new adaptive robust controller, based on the Radial Basis Function (RBF) neural network, is proposed. A three-tier approach is also followed. Firstly, a detailed new model for the ARA is derived using the Lagrange–d’A
... Show MoreIncreasingly important public opinion polls steadily .... especially in electoral campaigns, sheds searchlight on the side of the US elections, in different time periods, and cited the words of experts and people involved in it, and reviews Find great development that took place in the polls and what could happen to this work It is important in the future. Display search for certain types of polls, dividing them on as stated by the experts in the United States... This division shows that the surveys of the most political processes and accuracy of information, and that their Money being made and companies specialized in the administration of this type of measuring public opinion ..... what is returned decision-making, for example, in conj
... Show MoreAbstract
This research aims to the relationship and the effect of concurrent engineering dimensions analyze (product design, process design, and supply chain design) on the dimensions of strategic performance (efficiency, and effectiveness) The research was conducted in public Zora Electrical Industries Company, on a sample of departments and officials, engineers, managers and people in the company amounted to (45) . A questionnaire was used for the purpose of data collection which has been adopted, with the use of statistical methods via computerized system (spss) for processing data , identifying them and testing the research hypotheses. The research
... Show MoreIn this research, we use fuzzy nonparametric methods based on some smoothing techniques, were applied to real data on the Iraqi stock market especially the data about Baghdad company for soft drinks for the year (2016) for the period (1/1/2016-31/12/2016) .A sample of (148) observations was obtained in order to construct a model of the relationship between the stock prices (Low, high, modal) and the traded value by comparing the results of the criterion (G.O.F.) for three techniques , we note that the lowest value for this criterion was for the K-Nearest Neighbor at Gaussian function .
Image compression is a serious issue in computer storage and transmission, that simply makes efficient use of redundancy embedded within an image itself; in addition, it may exploit human vision or perception limitations to reduce the imperceivable information Polynomial coding is a modern image compression technique based on modelling concept to remove the spatial redundancy embedded within the image effectively that composed of two parts, the mathematical model and the residual. In this paper, two stages proposed technqies adopted, that starts by utilizing the lossy predictor model along with multiresolution base and thresholding techniques corresponding to first stage. Latter by incorporating the near lossless com
... Show More