Preferred Language
Articles
/
jcopolicy-628
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Use of Principal Components Analysis in the Formation of a Sustainable Human Development Index for Arab Countries
...Show More Authors

This study aims to derive a sustainable human development index for the Arab countries by using the principal components analysis, which can help in reducing the number of data in the case of multiple variables.  This can be relied upon in the interpretation and tracking sustainable human development in the Arab countries in the view of the multiplicity of sustainable human development indicators and its huge data, beside the heterogeneity of countries in a range of characteristics associated with indicators of sustainable human development such as area, population, and economic activity. The study attempted to use the available data to the selected Arab countries for the recent years. This study concluded that a single inde

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 30 2018
Journal Name
Iop Conference Series: Materials Science And Engineering
Damage pattern scope prediction for well point dewatering on building foundations
...Show More Authors

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2006
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
تقييــم ضريبـة نقـــل ملكيـة العقـــار: بحـث تطبيقــي فـي الهيئـة العامــــة للضـرائب
...Show More Authors

تحتل ضريبة الدخـل على نقل ملكية العقار خصوصية  عن بقية مصادر الدخل الاخرى وذلك لكونها تفرض على نقل ملكية العقار ومنافعه , حيث كانت تفرض الضريبة بموجـب قانون ضريبة الدخل رقم 113 لسنة 1982 والذي جاء هذا القانون غير بعيد عن مضمـون القانون رقم 95 لسنة 1959 وأهم مايلاحظ عليه بالنسبة لأرباح نقل ملكيـة العقـار أو نقل حق التصرف فيه هو أن الربح أو الخسارة الناتجة عن بيع العقار المسبوق بشراء يتـم عـن طريق القيمة أو البدل أي

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of Cognitive Conflict Strategy in Comprehending Reading Among the Fifth Literary Students in the Subject of Literature and Texts
...Show More Authors

The aim of the current study is to identify the effectiveness of cognitive conflict strategy in comprehending reading among literary fifth students in literature and literature texts. The researcher uses experimental method with partial control. The sample consisted of (80) students distributed into control and experimental groups. The scientific material, the behavioral goals, the teaching plans, and the instrument of the research have been prepared (reading comprehension test) by the researcher.

The instrument's validity and reliability have been calculated and then applied to the sample. After treating the data statistically by using SPSS, the results have revealed that there is a statistically significant difference at the si

... Show More
View Publication Preview PDF