Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the Range Application of Internal Marketing for HRM Philosophy in the Public Company for Electrical and Electronic Industries
...Show More Authors

The reason behind choosing this topic " internal marketing (IM) of human resource management (HRM)" is to highlight the advantages of using IM in the organization framework. The problem of the research paper lies in not paying enough attention to employees genuine needs as they interact with each other in the sake of organization prosper. This research paper can be used as indictor to expose the weaknesses that the organization encounters daily. The current research paper attempts at examining the possibility of developing philosophy of internal marketing of human resources and its most practices, empowering staff, training courses, motivations and recognitions, and within departments communication, in order to reach targeted res

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Nov 19 2017
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Image Compression based on Fixed Predictor Multiresolution Thresholding of Linear Polynomial Nearlossless Techniques
...Show More Authors

Image compression is a serious issue in computer storage and transmission,  that simply makes efficient use of redundancy embedded within an image itself; in addition, it may exploit human vision or perception limitations to reduce the imperceivable information Polynomial coding is a modern image compression technique based on modelling concept to remove the spatial redundancy embedded within the image effectively that composed of two parts, the  mathematical model and the residual. In this paper, two stages proposed technqies adopted, that starts by utilizing the lossy predictor model along with multiresolution base and thresholding techniques corresponding to first stage. Latter by incorporating the near lossless com

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Thu Feb 19 2026
Journal Name
Journal Of The College Of Basic Education
Fuzzy Nonparametric Regression Model Estimation Based on some Smoothing Techniques With Practical Application
...Show More Authors

In this research, we use fuzzy nonparametric methods based on some smoothing techniques, were applied to real data on the Iraqi stock market especially the data about Baghdad company for soft drinks for the year (2016) for the period (1/1/2016-31/12/2016) .A sample of (148) observations was obtained in order to construct a model of the relationship between the stock prices (Low, high, modal) and the traded value by comparing the results of the criterion (G.O.F.) for three techniques , we note that the lowest value for this criterion was for the K-Nearest Neighbor at Gaussian function .

View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
An exploratory study of history-based test case prioritization techniques on different datasets
...Show More Authors

In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 31 2021
Journal Name
Electronics
Adaptive Robust Controller Design-Based RBF Neural Network for Aerial Robot Arm Model
...Show More Authors

Aerial Robot Arms (ARAs) enable aerial drones to interact and influence objects in various environments. Traditional ARA controllers need the availability of a high-precision model to avoid high control chattering. Furthermore, in practical applications of aerial object manipulation, the payloads that ARAs can handle vary, depending on the nature of the task. The high uncertainties due to modeling errors and an unknown payload are inversely proportional to the stability of ARAs. To address the issue of stability, a new adaptive robust controller, based on the Radial Basis Function (RBF) neural network, is proposed. A three-tier approach is also followed. Firstly, a detailed new model for the ARA is derived using the Lagrange–d’A

... Show More
View Publication
Scopus (43)
Crossref (39)
Scopus Clarivate Crossref
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
Digital public relations and its role in prioritizing the masses: An analytical study of the United Nations website : (A paper extracted from a PhD dissertation)
...Show More Authors

This paper aims to identify how the United Nations works through its website in prioritizing audiences towards international issues، by identifying the digital PR mechanisms used in digital PR contents in prioritizing audiences towards the international issues they deal with. To achieve the objectives of this paper, the researcher used the survey method and content analysis tool with a view to identifying the ranking of international issues on the website of health، peace and security، humanitarian assistance، human rights، women، migrants، refugees and displaced persons، economic development، United Nations affairs، culture and education، environment and climate، sustainable development, and law and crime prevention. One of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 19 2026
Journal Name
Al–bahith Al–a'alami
The strategy of Marketable Public Relations Internationally Analytical study of the websites of “ Apple “ and “Samsung “ on the internet: (A research drawn from a Master Degree thesis)
...Show More Authors

The international organizations showed their interest in the marketable public relations, with their activities, means and strategies, they play a crucial role in marketing products, services and ideas of the institution. They are considered to be the link between the company and its public, They are responsible for presenting the institution to the public, with honest transmission of the information. This gives a good impression to the institution, in a way the institution and its products become consistent with the needs and interests of the public.  Based on this, the research aims to identify the strategies used by the marketable public relations internationally.  The r

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of TQM in promoting employee loyalty: Search exploratory In AL- Fedaa Public Company
...Show More Authors

       The research aims to determine the principles of total quality management (commitment of senior management, product planning, customer satisfaction, process improvement) and its role in promoting employee loyalty through a sample survey of the opinions of managers in public redemption Company. Which amounted to (45) individuals adoption of the questionnaire as a tool head in collecting data and information and their responses were analyzed using several statistical methods, which included (arithmetic mean, standard deviation, correlation coefficient, and the coefficient of simple regression) depending on the program (spss). The research found a group of the most important conclusions from the presence

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Advanced GIS-based Multi-Function Support System for Identifying the Best Route
...Show More Authors

Geographic Information Systems (GIS) are obtaining a significant role in handling strategic applications in which data are organized as records of multiple layers in a database. Furthermore, GIS provide multi-functions like data collection, analysis, and presentation. Geographic information systems have assured their competence in diverse fields of study via handling various problems for numerous applications. However, handling a large volume of data in the GIS remains an important issue. The biggest obstacle is designing a spatial decision-making framework focused on GIS that manages a broad range of specific data to achieve the right performance. It is very useful to support decision-makers by providing GIS-based decision support syste

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF