Preferred Language
Articles
/
ijs-7081
Audio Hiding in Color Image Using SLT Schemes
...Show More Authors

As usage of internet grows in different applications around the world, many techniques were developed to guard an important data against from illegal access and modification from unauthorized users by embedding this data into visual media called host media. Audio hiding in an image is a challenge because of the large size of the audio signal. Some previous methods have been presented to reduce the data of the audio signal before embedding it in the cover image, however, these methods was at the cost of reducing the quality of the audio signal. In this paper, a Slantlet transform (SLT) based method is applied to obtain better performance in terms of audio quality. In addition, the data hiding scheme in the cover color image has been implemented using SLT matrix method. The simulation results prove that the proposed algorithm produce better performance in terms of audio quality and execution time in comparison with the existing DWT based schemes. Also, the proposed data hiding scheme takes good visual quality results and high data hiding capacity.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 25 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Health TV shows and consumer awareness/ Analytical study of the Green Apple program.: Health TV shows and consumer awareness/ Analytical study of the Green Apple program.
...Show More Authors

Television plays an important role in health education development of the consumer, where the health programs offered by satellite channels offering a variety of subjects that deal with human health in general, as do people with some misconceptions health practices either due to lack of awareness or a low level of culture they have is one of the problems that require a search, so the research aims to clarify what the TV play in health education to the consumer through a content analysis of health issues covered by the television health programs and identify health issues positive and negative in everyday human life, it has been identified green apple program Broadcast of the channel mbc1 as a model for health programs offered by the Arab

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
THE MEDIATING ROLE OF PRODUCT INNOVATION ON THE RELATIONSHIP BETWEEN MARKETING INFORMATION SYSTEM AND CUSTOMER ORIENTATION
...Show More Authors

 Marketing information system (KMIS) is an essential factor of developing business’ performance and getting sustainable success. The main goal of the research is to measure effect of MIS on customer orientation and product innovation. Also, another goal is to analyze the mediation role of product innovation in relationship MIS and customer orientation. This study sought to analyze the marketing information system and measure its effect on the customer orientation and product innovation. The data of the study were collected using questionnaire. The data were analyzed using statistical tools and SPSS programming. The results of the study showed that the KMIS can positively and significantly effect product innovation. Also, t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Design and Implementation ofICT-Based Recycle-Rewarding System for Green Environment
...Show More Authors

This paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Integration of e-commerce, information technology and its impact on reducing costs to make pricing decisions
...Show More Authors

   E-commerce is the most important result of information technology in this day and age, has resulted in the use of commercial transactions to changes in economic, social, and psychological, and produced a new type of shopping, jobs, and create new job opportunities, and changed the traditional work environment. The challenge currently facing economic units is how to transfer this technology and its integration within the community, especially after the massive developments that have occurred in the areas of commercial and congested markets units, the economic and the products and services the many and varied and intensified competition among these units to achieve a profit, leading to the emergence of e-commerce as on

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of survival models to study determinants liver cancer
...Show More Authors

Cancer is one of the dangerous diseases that afflict a person through injury to cells and tissues in the body, where a person is vulnerable to infection in any age group, and it is not easy to control and multiply between cells and spread to the body. In spite of the great progress in medical studies interested in this aspect, the options for those with this disease are few and difficult, as they require significant financial costs for health services and for treatment that is difficult to provide.

This study dealt with the determinants of liver cancer by relying on the data of cancerous tumours taken from the Iraqi Center for Oncology in the Ministry of Health 2017. Survival analysis has been used as a m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Comparison between Modified Weighted Pareto Distribution and Many other Distributions
...Show More Authors

 

In 2020 one of the researchers in this paper, in his first research, tried to find out the Modified Weighted Pareto Distribution of Type I by using the Azzalini method for weighted distributions, which contain three parameters, two of them for scale while the third for shape.This research compared the distribution with two other distributions from the same family; the Standard Pareto Distribution of Type I and the Generalized Pareto Distribution by using the Maximum likelihood estimator which was derived by the researchers for Modified Weighted Pareto Distribution of Type I, then the Mont Carlo method was used–that is one of the simulation manners for generating random samples data in different sizes ( n= 10,30,50), and in di

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
A Secure Private Key Recovery Based on DNA Bio-Cryptography for Blockchain
...Show More Authors

     The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
ECC Based Encryption for the Secured Proactive Network Forensic Framework
...Show More Authors

     Elliptic Curve Cryptography (ECC) is one of the public key cryptosystems that works based on the algebraic models in the form of elliptic curves. Usually, in ECC to implement the encryption, the encoding of data must be carried out on the elliptic curve, which seems to be a preprocessing step. Similarly, after the decryption a post processing step must be conducted for mapping or decoding the corresponding data to the exact point on the elliptic curves. The Memory Mapping (MM) and Koblitz Encoding (KE) are the commonly used encoding models. But both encoding models have drawbacks as the MM needs more memory for processing and the KE needs more computational resources. To overcome these issues the proposed enhanced Koblitz encodi

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cyber security technology and the reflection of its application on the quality of financial reports: An exploratory study of a sample of internal and external auditors
...Show More Authors

Abstract

                 This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an

... Show More
View Publication Preview PDF
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lagrange Interpolation for Mobile Agent Connection Encryption
...Show More Authors

A new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.

 

View Publication Preview PDF