Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
This study discussed modern variable in the organizational thought that is the high performance organizations in the two of Iraqi public organizations. The aim of study determines to know the level of the performance in this organizations (high or not). The data was Collected by questionnaire which contain (8) characteristics, the organizational design, strategy, process, technology, leadership, the roles, culture, and external environment). The sample contain from (76) employees;
Results points that the two organizations didn’t reach to the high level of performance, and there are significance's difference among them.
Abstract
The research problem Focused about extent adoption of the financial reporting obligations and assets of the deferred income tax attributable to the concepts of accounting theory and whether the tax laws or accounting principles as well as local accounting rules to recognize the obligations and assets of deferred income tax in the financial statements, and what is the impact of the financial reporting of liabilities and assets Deferred tax in the quality of accounting information, and research aims to the statement of the accounting concepts of the theory of financial reporting obligations and assets of deferred income tax, view and analyze the differences in reporting, resulting from a discrepanc
... Show MoreThe pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed
Untreated municipal solid waste (MSW) release onto land is prevalent in developing countries. To reduce the high levels of harmful components in polluted soils, a proper evaluation of heavy metal concentrations in Erbil's Kani Qrzhala dump between August 2021 and February 2022 is required. The purpose of this research was to examine the impact of improper solid waste disposal on soil properties within a landfill by assessing the risks of contamination for eight heavy elements in two separate layers of the soil by using geoaccumulation index (I-geo) and pollution load index (PLI) supported. The ArcGIS software was employed to map the spatial distribution of heavy element pollution and potential ecological risks. The I-geo values in summe
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreThe turning process has various factors, which affecting machinability and should be investigated. These are surface roughness, tool life, power consumption, cutting temperature, machining force components, tool wear, and chip thickness ratio. These factors made the process nonlinear and complicated. This work aims to build neural network models to correlate the cutting parameters, namely cutting speed, depth of cut and feed rate, to the machining force and chip thickness ratio. The turning process was performed on high strength aluminum alloy 7075-T6. Three radial basis neural networks are constructed for cutting force, passive force, and feed force. In addition, a radial basis network is constructed to model the chip thickness ratio. T
... Show Moreهدفت هذه الدراسة إلى تحليل نتائج الاختبار الوطني الموحد الذي تطبقه وزارة التربية والتعليم الفلسطينية في مادة الرياضيات لطلبة الصف الثامن الأساسي في المدارس الحكومية في محافظة طولكرم، وذلك لمعرفة مستوى الطلبة على هذا الاختبار في ضوء متغيرات الجنس والمنطقة التعليمية ونوع المدرسة، ومعرفة علاقة التحصيل على هذا الاختبار بتحصيل الطلبة المدرسي والمعدل العام. ولتحقيق ذلك تم تحليل درجات (3218) طالباً وطالبة؛ وهم ي
... Show More