Preferred Language
Articles
/
jeasiq-2120
Enhancing national security through foreseeing the economic intelligence system in Iraq
...Show More Authors

 

         Economic intelligence represents a modern field of knowledge that has been and is still the focus of many studies and research, including this research that deals with economic intelligence and its role in strengthening Iraqi national security - an analytical study. Economic development and economic development without security, and in a situation such as that of Iraq, which is still suffering from conflicts, conflicts and the effects of wars, as well as the unstable conditions in its regional environment, the directions of that relationship cannot be determined except through the availability of accurate information, indicators, full knowledge of reality and the possibility of exploring future possibilities

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 26 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
USE OF ESSENTIAL OIL FOR NIGELLA (Nigella sativa) AND SPEARMINT (Menthaspicata) TO PROLONG SHELF LIFE DURATION OF SOFT WHITE CHEESE: USE OF ESSENTIAL OIL FOR NIGELLA (Nigella sativa) AND SPEARMINT (Menthaspicata) TO PROLONG SHELF LIFE DURATION OF SOFT WHITE CHEESE
...Show More Authors

The effects of essential oilNigella sativa and Menthawas study on the chemical, microbial and sensory properties for soft white cheese that produced from it during storage at 0, 7 and 14 days .The results show significantly percent decrease in moisture for all samplesand maximum decrease was at the latest storage period for all them .The reduced in moisture was accompanied with increase in percentage of protein and fat during of storage period for all samples.
The control sample showed increased in bacterial logarithmic for total count bacterial, coliform, Staphylococcus aureus, proteolytic bacteria, lipolytic bacteria and mold and yeasts during of storage period , the highest results showed at the latest storage period 14days, it w

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sun Sep 29 2019
Journal Name
Iraqi Journal Of Science
Intelligent TRIPLE DES with N Round Based on Genetic Algorithm
...Show More Authors

     This work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm. Encapsulated cipher file with special program which send an acknowledgment to a sender to know who decipher or  broken to  crash it , Thus it is considered as the initial step to improve privacy. The outcome for proposed system gives a good indication that it is a promising system compared with other type of cipher system.

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes
...Show More Authors

Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Sep 13 2022
Journal Name
جامعة بغداد/ كلية التربية للعلوم الصرفة - ابن الهيثم
اثر انموذج تسريع التعلم في تحصيل مادة الرياضياتوالتفكير المحوري لدى طالبات الصف الثالث المتوسط
...Show More Authors

Publication Date
Thu Jul 02 2015
Journal Name
الاستاذ
النقد القصصي في منجزات الدكتور نجم عبد الله كاظم (القصة القصيرة والقصيرة جدًا أنموذجًا)
...Show More Authors

Publication Date
Tue Dec 15 2020
Journal Name
Alustath Journal For Human And Social Sciences
مستويات التفكير الهندسي لدى طلبة قسم الرياضيات في كلية التربية/ابن الهيثم - جامعة بغداد
...Show More Authors

رمت الدراسة التعرف بمستويات التفكير الهندسي لدى طلبة قسم الرياضيات في كلية التربية / ابن الهيثم - جامعة بغداد، ولتحقيق هدف الدراسة تم اعتماد مقياس الحربي(2003) المعد على البيئة السعودية ويتكون من (25)  فقرة موزعه على خمسة مستويات وهي (المستوى البصري ، التحليلي ، شبه الاستدلالي، الاستدلالي، المجرد وبلغت عينة الدراسة (206) طلاب من طلبة قسم الرياضيات في كلية التربية- ابن الهيثم بجامعة بغداد تم اختيارهم بالطريقة ال

... Show More
View Publication Preview PDF
Crossref