Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 03 2023
Journal Name
College Of Islamic Sciences
Ruling on selling big data (Authentical Fiqh Study): Ruling on selling big data (Authentical Fiqh Study)
...Show More Authors

Abstract:

Research Topic: Ruling on the sale of big data

Its objectives: a statement of what it is, importance, source and governance.

The methodology of the curriculum is inductive, comparative and critical

One of the most important results: it is not permissible to attack it and it is a valuable money, and it is permissible to sell big data as long as it does not contain data to users who are not satisfied with selling it

 Recommendation: Follow-up of studies dealing with the provisions of the issue

Subject Terms

Judgment, Sale, Data, Mega, Sayings, Jurists

 

View Publication Preview PDF
Publication Date
Tue Jun 02 2009
Journal Name
Albahith Alalami
A proposed scientific strategy for public relations activity at the Integrity Authority.
...Show More Authors

This study deals with knowing the public relations activities of the Integrity Commission for the year 2007, knowing the contents of these activities, knowing the contents of the advertisements that it published, whether the contents of the advertisements were convincing, and whether press photographs were used in these advertisements, as well as whether symbols and slogans were used. What language and words were used to address the recipient? 1- What feelings do the contents of advertisements arouse? 2- Research objectives: This research aims to answer the following questions: What are the public relations activities carried out by the Integrity Commission? B: Are the contents of the advertisements published by the Authority convincing to

... Show More
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Enhancing national security through foreseeing the economic intelligence system in Iraq
...Show More Authors

 

         Economic intelligence represents a modern field of knowledge that has been and is still the focus of many studies and research, including this research that deals with economic intelligence and its role in strengthening Iraqi national security - an analytical study. Economic development and economic development without security, and in a situation such as that of Iraq, which is still suffering from conflicts, conflicts and the effects of wars, as well as the unstable conditions in its regional environment, the directions of that relationship cannot be determined except through the availability of accurate information, indicators, full knowledge of reality and the pos

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Cascade-Forward Neural Network for Volterra Integral Equation Solution
...Show More Authors

The method of solving volterra integral equation by using numerical solution is a simple operation but to require many memory space to compute and save the operation. The importance of this equation appeares new direction to solve the equation by using new methods to avoid obstacles. One of these methods employ neural network for obtaining the solution.

This paper presents a proposed method by using cascade-forward neural network to simulate volterra integral equations solutions. This method depends on training cascade-forward neural network by inputs which represent the mean of volterra integral equations solutions, the target of cascade-forward neural network is to get the desired output of this network. Cascade-forward neural

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Finite Element Neural Network And Its Applications To Forward And Inverse Problems
...Show More Authors

In this paper, first we   refom1Ulated   the finite   element  model

(FEM)   into   a   neural   network   structure   using   a   simple   two   - dimensional problem. The structure of this neural network is described

, followed  by its   application   to   solving  the forward    and  inverse problems. This model is then extended to the general case and the advantages and  di sadvantages  of  this  approach  are  descri bed  along with an analysis  of  the sensi tivity   of

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 06 2013
Journal Name
Creative Construction Conference 2013
The challenges of governing public private partnership in Iraq infrastructure projects
...Show More Authors

Public-private partnership (PPP) has been used over the past 20-30 years by governments in developed countries to meet the public demand for infrastructural services. In Iraq, the PPP concept is comparatively new to the Government of Iraq (GoI), where the government has historically taken most of the responsibility for providing public services. There are few PPP projects in Iraq. However, the number is increasing. Recently the Iraqi market has experienced a number of attempts of PPP in different sectors, especially after the new investment law in 2006. The aim of this paper is to evaluate the investment environment in Iraq and to indicate the main factors affecting PPP in particular for infrastructure projects. Some literature review and

... Show More
Publication Date
Mon Mar 07 2022
Journal Name
Book
Insights into developing curricula in mass communication departments and colleges in public and private universities
...Show More Authors

Technology developed at very rapid paces in the last decade of the twentieth century and what followed, especially communication technology, as the World Wide Web appeared in the mid-nineties of the last century, Facebook in 2004 and 2006, the mobile phone, 1993, 1994, and social networking sites. The other. These technological developments have had an impact on societies, whether among individuals in one country or among different peoples. The citizen in any part of the world has become a journalist who practices the work of a specialized or professional journalist, even if he does not know how to read and write, or has a low level of education, as he can now transmit events from wherever he is to the world, through his personal page, or v

... Show More
Preview PDF
Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
دور مراقب الحسابات في ظل تكنولوجيا المعلومات المعقدة ومخاطر التدقيق
...Show More Authors

بدأت الشركات تخطو خطوات متسارعة  باستخدام أنظمة تكنولوجيا المعلومات في عملياتها المالية وباعتماد قليل على الورق والذي يتم الاحتفاظ بالنسخ الأصلية منه تعزيزا للإجراءات التي تمت معالجتها الكترونيا. إن ممارسة الشركات وبشكل متزايد الأسلوب الواقعي (Virtualization) في علاقاتها مع الموردين والمستهلكين والشركاء أدى للحاجة المتزايدة للثقة والتأكيد على مثل هذه العلاقات مما يولد ضغطا  كبيرا ع

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 28 2022
Journal Name
Al–bahith Al–a'alami
Frames of Al-Alam TV channel’s handling of the Iraqi and Lebanese protests Analytical study of the main news bulletin for the period from October 1, 2019, to December 31, 2019
...Show More Authors

        In October 2019, Iraq and Lebanon witnessed widespread protests, which aroused the interest of the media, as they began with demands for the provision of services, then escalated with the overthrow of the political system. The researchers chose a satellite channel that represents a direction for a country accused of entering the line of protests. This paper aims to analyze the main bulletin of Al-Alam channel to find out how it deals with the protests in the news. It is classified descriptively, using the survey method and the method of content analysis. The study community was represented by the main news bulletin of Al-Alam channel. The researchers adopted a deliberate sample for the period from 1/10/2019 to

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref