Preferred Language
Articles
/
JxbtIIgBVTCNdQwCaXTN
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Thu Apr 01 2021
Journal Name
Biochemical And Cellular Archives
Evaluation the Effect of Allium Sativum (garlic) oil on The Expression of Maz E and Maz F Genes in Escherichia Coli Clinical Isolates
...Show More Authors

Scopus (4)
Scopus
Publication Date
Fri Mar 13 2026
Journal Name
Journal Of Physical Education
The Effect of Special Exercises Using Rubber Ropes on The Development of Some Physical Abilities and Achievement in F56 Female Discuses Thrower Class
...Show More Authors

View Publication
Publication Date
Sun Sep 26 2021
Journal Name
Modern Sport
The Effect Of Plank Exercises On The Lipid Component And The Rate Of Metabolism (Bmr) Among Students Of The Higher Institute For Security And Administrative Development
...Show More Authors

The introduction of the research on the science of training and the physiology of sports was addressed from important sciences, where the physical effort drew the attention of scientists since the past centuries when they studied how the body performs its functions when performing physical exertion and observe the changes that occur in it and write down and study especially the positive effects of the practice of daily sports The aim of the study was to investigate the effect of plank exercises on the lipid component and the metabolic rate (bmr) of the female students of the Higher Institute for Security and Management Development. As for the third chapter, the two researchers used the experimental method on a sample of the female s

... Show More
View Publication
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Practice of Continuous Auditing in accordance with Technology Acceptance Model: An analytical study of a sample of the Iraqi auditing Offices
...Show More Authors

Abstract

This paper discusses the essence of the developmental process in auditing firms and offices at the world today. This process is focused on how to adopt the audit concepts which is based on Information and Communication Technology (ICT), including the Continuous Auditing (CA) in particular. The purpose of this paper is to design a practical model for the adoption of CA and its requirements according to the Technology Acceptance Model (TAM). This model will serve as a road map for manage the change and development in the Iraqi auditing firms and offices. The paper uses the analytical approach in reaching to the target results. We design the logical and systematic relations between the nine variable

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 02 2024
Journal Name
International Development Planning Review
DESIGNING AN AUXILIARY DEVICE AND ITS IMPACT ON LEARNING THE SKILLS OF ANGULAR SUPPORT AND OPEN SUPPORT FOR HANDSTAND PUSH-UPS ON THE PARALLEL APPARATUS IN ARTISTIC GYMNASTICS FOR BUDS
...Show More Authors

Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Engineering
Laboratory Study on the Effect of Water-Cement Ratio on Strength Characteristics of Jet Grouting Columns
...Show More Authors

Jet grouting is one of the most widely applied soil improvement techniques. It is suitable for most geotechnical problems, including improving bearing capacity, decreasing settlement, forming seals, and stabilizing slopes. One of the difficulties faced by designers is determining the strength and geometry of elements created using this method. Jet grouted soil-cement columns in soil are a complicated issue because they are dependent on a number of parameters such as soil type, grout and water flow rate, rotation and lifting speed of monitor, nozzle jetting force, and water to cement ratio of slurry. This paper discusses the effect of the water-cement ratio on the physical and mechanical characteristics of soilcrete. In t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
What the linguists commented on, "I do not know" in the dictionary of Lisan al-Arab, a semantic study
...Show More Authors

Absitract

This research was interested in studying the phrase “I don’t know” in the Lisan al-Arab dictionary, and Lisan al-Arab was based on collecting its material from five dictionaries, including: Tahdhib al-Lugha, al-Muqamah, al-Sahih, and the footnotes of Ibn Berri, al-Nihaya and Gharib al-Hadith. The objection to this phrase, and the discussion of its various implications among linguists and the clarification of the closest and most famous content to it according to the data presented to the researcher in his research journey, and to reach this goal, the research division into a preface, five demands and a conclusion and followed the list of sources and references. To define the lexicon of Lisan al-Ar

... Show More
View Publication Preview PDF
Crossref