Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2005
Journal Name
مجلة مداد كلية الاداب الجامعة العراقية
الامشطة الاتصالية للعلاقات العامة في المؤسسات الدينية العراقية ,دراسة تحليلية في الإصدارات الصحفية في دواوين الأوقاف الدينية للمدة من (1 /12 / 2009م - 30 / 6 / 2010م ).
...Show More Authors

تعد أنشطة العلاقات العامة تمثل جانباً مهماً من جوانب عمل المؤسسات بشكل عام في الوقت الحاضر، وتأخذ خصوصية أكثر في المنظمات الحكومية، بسبب الأعباء الضخمة والمسؤوليات العديدة تجاه أفراد المجتمع، وقد اهتمت الدول المتقدمة والنامية على حد سواء بهذا النشاط. إن أنشطة العلاقات العامة تؤدي دوراً هاماً في تسهيل عملية الاتصال وتحقيق الفهم المتبادل وتوطيد العلاقة بين الطرفين – المؤسسة والجمهور – وللعلاقات العامة دور

... Show More
View Publication
Publication Date
Sun Jun 27 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Quality of Nursing Care Services Provided to Children under Five Years Based on Integrated Management of Child Health at Primary Health Care Centers in Baquba City
...Show More Authors

Objective(s): The study aims to evaluating the quality of nursing care provided to children under five years to compare between quality related to type of health sectors; to determine the quality of nursing care and to compare between such care in Baquba Health Care Sector I and II.

Methodology: A descriptive study is carried out for the period from December 15th 2019 to May 1st 2020. A purposive "non- probability" sample, of (60) staff nurse and (60) children is selected. An adopted questionnaire has been selected for the study which consists of three parts. The first part is nurses’ socio-demographic characteristic; the second part is ch

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 30 2025
Journal Name
Al-turath University College Multidisciplinary Journal
The Role of Nominalization in Social Media Discourse An English Corpus Based Analysis دور التعابير الاسمية في خطاب وسائل التواصل الاجتماعي : تحليل يعتمد البيانات المحوسبة في اللغة الانكليزية
...Show More Authors

The expansion of the social media environment has created its own linguistic realities which involve more colloquial communication and practical employment of language. This research focuses on nominalizations in detail, which are originally formed words that have been changed for a noun role. These nominalizations are examined within the context of Facebook posts. The research aims to discover the various nominalizations used and how often they appear in a large sample of data from Public Facebook Posts Corpora. Computational linguistics opened new fields of study and enabled researchers to study large amounts of data easily, making it easier to identify patterns. Two computational methods of identifying nominalization in a large dataset w

... Show More
Preview PDF
Publication Date
Wed Aug 27 2025
Journal Name
Baghdad Science Journal
A Clustering Technique Based on the Hard K-Means (H.KM.) Method to Determine the Governorate That Have More Influence for Spreading COVID-19 in the Kingdom of Saudi Arabia
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
African Journal Of Hospitality, Tourism And Leisure
An analytical study of the strategic flexibility variation as a function of the dynamic capabilities based on supply chain management (Case study: The General Petroleum Products Distribution Company in Baghdad)
...Show More Authors

Scopus (9)
Scopus
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Evaluation of Holy Quran & Islamic Education Curriculum of Second Intermediate Stage from Perspectives of Teachers & Supervisors of the Material:A Field Study conducted in the Directorates-General of Education in Baghdad Governorate: أشواق عبـد الحـسن عبـد
...Show More Authors

Evaluation of “Holy Quran & Islamic Education” Curriculum for Second Intermediate Stage from Perspectives of Teachers & Supervisors of material A Field Study conducted in the Directorates-General of Education in Baghdad Governorate. It goes without saying that educational curricula for students of all stages of schooling are in bad need of reviewing, evaluation and revision. The Islamic education curriculum is no exception, since it is a basic subject that plays a role in developing the individual’s moral and conscientious aspects, promotes his/her inner discipline and helps establish coherence with the values system of the community to which he/she belongs.

Based on the foregoing, the evaluation process of

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 16 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Technological Maturity and its role in reinforcing the quality of auditing: An analytical study in Iraqi audit offices
...Show More Authors

This paper discusses the role of Auditors' Technological Maturity in reinforcing the quality of auditing profession, through focusing on the concepts of Technological Maturity and quality of auditing profession, as well as designing a proposed model for Technological Maturity which includes five evolutionary and sequential stages, and this proposed model would contribute to reinforce the quality of auditing. This proposed model will be employed in the field of auditing profession because the importance of the development and investment in this profession and the importance of the need for specialized knowledge in Information Technology, and the result of a proposed model is development of technological knowledge for the auditor to reach

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimating and Analyzing Food Security Indicators in Selected Arab Countries for the Period (1996 - 2012)
...Show More Authors

        The study hypothesize that the majority of Arab countries  show a poor agricultural economic efficiency which resulted in a weak productive capacity of wheat in the face of the demand, which in turn led to the fluctuation of the rate of self-sufficiency and thus increase the size of the food gap. The study aims at estimating and analyzing the food security indicators for their importance in shaping the Arabic agricultural policy, which aims to achieve food security through domestic production and reduce the import of food to less possible extent. Some of the most important results reached by the study were that the increase in the amount of consumption of wheat in the countries of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 30 2022
Journal Name
International Journal Of Drug Delivery Technology
. Preparation and Characterization of Atorvastatin Calcium Trihydrate-cyclodextrin Inclusion Complex
...Show More Authors

Atorvastatin calcium (ATR) is an antihyperlipidemic agent used for lowering blood cholesterol levels. However, it is very slightly soluble in water with poor oral bioavailability, which interferes with its therapeutic action. It is classified as a class II drug according to Biopharmaceutical Classification System (low solubility and high permeability).

View Publication Preview PDF
Scopus (8)
Scopus Crossref