Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
A Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated visualization
... Show MoreThe audit profession today gets an increasing interest by the financial , economic and legal contemporary societies , because of the importance of the technical & neutral auditor’s opinion to the financial reports beneficiaries in order to enable them making their investment decisions , but some of them whom suffered damage or loss when they made that decisions according to the mentioned financial statements which consolidated with auditor’s report , exposed the function to a responsibility and credibility crisis in addition to missing the trust especially at the latest years. They always ask why or what is the reason that cause the auditor didn’t giving us any warning signs about the economic mater for that companies.
Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show MoreIt has been an increase concern of scientific and professional accounting sides on disclosure especially after appearance of business firms and accounting development with its relationship to financial statements which are considered to be outputs of the activity results. The preparing of financial statements and auditing of those accounts according to normal principles and standards of accounting on both local and international levels. Accounting disclosure can be seen an importance through discover all fundamental and necessary information for proper supply. Therefore, the research will highlight on public companies commitment in Iraq for basis and standards which have taken disclosure in financial data. The conceptual frame of t
... Show MoreThe problem of this paper is identified by knowing the role of the economic television media in shaping the audience's attitudes. It seeks to understand the type of relationship between the dependence of the economic elite audience on news bulletins and its cognitive implications. The categories of Iraqi society, namely, the economic elite category. This paper adopted the descriptive survey method for the period from 3/1/2022 - 6/31/2022. The sample was extracted according to the relative stratified sampling method in the city of Baghdad. A set of results has been concluded, the most prominent of which is the public's heavy reliance on economic news bulletins to obtain news and information, as indicated by (63%) of the respondents partic
... Show MoreDiversity has become one of the required phenomena to be available within public organizations, in light of the changes taking place in the global and international environment and in various fields. Therefore, it was imperative to study the impact of this phenomenon in various institutions, especially public ones, in most developing countries, including Iraq. The current research aims to analyze the relationship between The demographic diversity and institutional effectiveness of a sample of workers in public institutions included (500) respondents. The questionnaires were distributed to them randomly. Diversity is considered an independent variable and institutional effectiveness a dependent variable. The researcher used interview tools a
... Show MoreFlat-plate collector considers most common types of collectors, for ease of manufacturing and low price compared with other collectors. The main aim of the present work is to increase the efficiency of the collector, which can be achieved by improving the heat transfer and minimize heat loss experimentally. Five types of solar air collectors have been tested, which conventional channel with a smooth absorber plate (model I), dual channel with a smooth absorber plate (model II), dual channel with perforating “V” corrugated absorber plate (model III), dual channel with internal attached wire mesh (model Ⅳ), and dual channel with absorber sheet of transparent honeycomb, (model Ⅴ). The dual channel collector used for
... Show MoreThe paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show More