Preferred Language
Articles
/
jih-1792
Securing digital documents using digital watermarking
...Show More Authors

     The intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents.  But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..

In this research LSB  technique  has been used to embedding Digital watermarking , the proposed method consist of two major part: the embedding part and extraction part. The BMP picture type has been used in embedding process for accuracy  and uncompressed image, and it is the best type in  embedding process. This technique used to discover the genuine documentThe experiments show the proposed technique has 100% accuracy in authenticating the genuine document and Multimedia content security.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
An Estimation of Survival and Hazard Rate Functions of Exponential Rayleigh Distribution
...Show More Authors

In this paper, we used the maximum likelihood estimation method to find the estimation values ​​for survival and hazard rate functions of the Exponential Rayleigh distribution based on a sample of the real data for lung cancer and stomach cancer obtained from the Iraqi Ministry of Health and Environment, Department of Medical City, Tumor Teaching Hospital, depending on patients' diagnosis records and number of days the patient remains in the hospital until his death.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Engineering
Natural and Mixed Convection in Square Vented Enclosure Filled with Metal Foam
...Show More Authors

Steady natural and mixed convection flow in a square vented enclosure filled with water-saturated aluminum metal foam is numerically investigated. The left vertical wall is kept at constant temperature and the remaining walls are thermally insulated. Forced convection is imposed by providing an inlet at cavity bottom surface, and a vent at the top surface. Natural convection takes place due to the temperature difference inside the enclosure. Darcy-Brinkman-Forchheimer model for fluid flow and the two-equation of the local thermal non-equilibrium model for heat flow was adopted to describe the flow characteristics within the porous cavity. Numerical results are obtained for a wide range of width of the inlet as a fraction

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Scientific Research Journal Of Engineering And Computer Science
Cryptography Techniques - A Review
...Show More Authors

l

Publication Date
Mon Sep 02 2024
Journal Name
مجلة القادسية لللقانون والعلوم السياسية
Strategies of Israeli National Security towards Syrian Border Cities after 2011 (Quneitra, Swayda, and Daraa)
...Show More Authors

Although Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. M

... Show More
View Publication
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Effects of Water Scarcity on Rural Household Economy
...Show More Authors

This study examined the effects of water scarcity on rural household economy in El Fashir Rural Council / North Darfur State- western Sudan. Both quantitative and qualitative methods were used as to get a deeper understanding of the impact of water scarcity on the rural house economy in the study area. 174 households out of 2017 were selected from 45 villages which were distributed in eight village councils forming the study area. Statistical methods were used to manipulate the data of the study. The obtained results revealed that water scarcity negatively affected the rural household economy in the study area in many features. These include the followings: much family efforts and time were directed to fetch for water consequentl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Al–bahith Al–a'alami
Employ of Public Relations in Building Awareness of Security against Terrorism A Survey of the Employees of the Directorate General of Public Relations and Media at the Ministry of Interior
...Show More Authors

This study aims at identifying the role played by Public Relations in the field of security awareness of the dangers of terrorism. The research is directed to the employees at the Directorate General of Public Relations and Media at the Ministry of Interior. And that on the basis that those who play an important role in the security awareness are the security institutions, primarily the Ministry of Interior, since this Directorate is responsible for all subjects related to the public security using public relations science. It aims at identifying the functions, methods and communication tools used by the Directorate to raise awareness about the dangers of terrorism. In order to achieve the research objectives, the researcher uses the sur

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 16 2022
Journal Name
International Academic Journal Of Accounting And Financial Management
Analyzing and Measuring the Relationship between Public Spending and the Parallel Exchange Rate in the Iraqi Economy for the Period 2004-2022
...Show More Authors

Public spending represents the government’s financial leverage and has a significant impact on real and monetary economic variables, and one of these effects is the effect of public spending on the exchange rate as an important monetary variable for monetary policy, As we know that public spending in Iraq is financed from oil revenues sold in US dollars, and the Ministry of Finance converts the US dollar into Iraqi dinars to finance the government's need to spend within the requirements and obligations of the state's general budget, And converting the US dollar into Iraqi dinars has an impact on the parallel exchange market, even if there is a contractual exchange rate between the Ministry of Finance and the Central Bank of Iraq to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 02 2020
Journal Name
Journal Of The College Of Languages (jcl)
Linguistic Errors in second language learning through Error Analysis theory: هه‌ڵه‌ زمانییه‌كان له‌ فێربوونی زمانی دووه‌مدا (له‌ ڕوانگه‌ی تیۆری شیكاری هه‌ڵه‌ییه‌وه‌)
...Show More Authors

Second language learner may commit many mistakes in the process of second language learning. Throughout the Error Analysis Theory, the present study discusses the problems faced by second language learners whose Kurdish is their native language. At the very stages of language learning, second language learners will recognize the errors committed, yet they would not identify the type, the stage and error type shift in the process of language learning. Depending on their educational background of English as basic module, English department students at the university stage would make phonological, morphological, syntactic, semantic and lexical as well as speech errors. The main cause behind such errors goes back to the cultural differences

... Show More
View Publication Preview PDF
Crossref (1)
Crossref