Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 19 2019
Journal Name
Artificial Intelligence Review
Survey on supervised machine learning techniques for automatic text classification
...Show More Authors

View Publication
Scopus (315)
Crossref (282)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
The Prediction of COVID 19 Disease Using Feature Selection Techniques
...Show More Authors
Abstract<p>COVID 19 has spread rapidly around the world due to the lack of a suitable vaccine; therefore the early prediction of those infected with this virus is extremely important attempting to control it by quarantining the infected people and giving them possible medical attention to limit its spread. This work suggests a model for predicting the COVID 19 virus using feature selection techniques. The proposed model consists of three stages which include the preprocessing stage, the features selection stage, and the classification stage. This work uses a data set consists of 8571 records, with forty features for patients from different countries. Two feature selection techniques are used in </p> ... Show More
View Publication Preview PDF
Scopus (31)
Crossref (24)
Scopus Crossref
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Geological Journal
A Review of Historical Studies for Water Saturation Determination Techniques
...Show More Authors

Water saturation is the most significant characteristic for reservoir characterization in order to assess oil reserves; this paper reviewed the concepts and applications of both classic and new approaches to determine water saturation. so, this work guides the reader to realize and distinguish between various strategies to obtain an appropriate water saturation value from electrical logging in both resistivity and dielectric has been studied, and the most well-known models in clean and shaly formation have been demonstrated. The Nuclear Magnetic Resonance in conventional and nonconventional reservoirs has been reviewed and understood as the major feature of this approach to estimate Water Saturation based on T2 distribution. Artific

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Apr 16 2025
Journal Name
International Journal Of Engineering Pedagogy (ijep)
Utilizing Machine Learning Techniques to Predict University Students' Digital Competence
...Show More Authors

Given the importance of possessing the digital competence (DC) required by the technological age, whether for teachers or students and even communities and governments, educational institutions in most countries have sought to benefit from modern technologies brought about by the technological revolution in developing learning and teaching and using modern technologies in providing educational services to learners. Since university students will have the doors to work opened in all fields, the research aims to know their level of DC in artificial intelligence (AI) applications and systems utilizing machine learning (ML) techniques. The descriptive approach was used, as the research community consisted of students from the University

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Using PCR and Gel Electrophoresis Techniques to Molecular Confirm and Detection for Flowering Gene Presence in Maize Hybrids
...Show More Authors
Abstract<p>The laboratory experiment was conducted in the laboratories of the Musayyib Bridge Company for Molecular Analyzes in the year 2021-2022 to study the molecular analysis of the inbreed lines and their hybrids F1 to estimate the genetic variation at the level of DNA shown by the selected pure inbreed lines and the resulting hybrids F1 of the flowering gene. Five pure inbreed lines of maize were selected (ZA17WR) Late, ZM74, Late, ZM19, Early ZM49WZ (Zi17WZ, Late, ZM49W3E) and their resulting hybrids, according to the study objective, from fifteen different inbreed lines with flowering time. The five inbreed lines were planted for four seasons (spring and fall 2019) and (spring and fall 2</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
High performance work systems and general industrial enterprise performance
...Show More Authors

High performance work systems and general industrial enterprise performance

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sat Dec 17 2022
Journal Name
Iraqi Journal Of Laser
PDF Study the Effect of Gold Film Thickness on the Sensitivity of the U Shape Fiber Sensor by the Occurrence of LSPR Phenomenon: Saffana Z. Maseer*, Bushra R. Mahdi
...Show More Authors

Abstract: In this paper, a U-shaped probe with a curvature diameter of half a centimeter was implemented using plastic optical fibers. A layer of the outer shell of the fibers was removed by polishing to a D-section. The sensor was tested by immersing it in a sodium chloride solution with variable refractive index depending on solution concentrations ranging from 1.333 to 1.363. In this design, the sensor experienced a decrease in its intensity as the concentration of the solution increased. The next step The sensor was coated with a thin layer of gold with a thickness of 20 nm, and the sensor was tested with the same solutions which resulted in a shift in wavelengths where the shift in wavelength was 5.37 nm and sensiti

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
College Of Islamic Sciences
The Economic Role of Sultan Al-Nasir Muhammad Ibn Qalawun in Egypt and the Levant Documentary Study through Writings and Inscriptions
...Show More Authors

The people lived under Mamluk rule, distress, poverty, famines, oppression of princes, rulers, And their domination and he always wished for a just ruler to relieve his misery, and remove the injustice

from him, so they found in Al-Nasser Mohammed tend to establish justice.

When Al-Nasser ascended the throne of the Sultanate, there was a rise or fall in prices, so he pursued Prices will end and punish those

who come out for it. And you talk about this search for a relationship

Sultan Al-Nasser with the poor classes in society and his keenness to pursue their affairs was compassionate On them, mer

... Show More
View Publication Preview PDF