Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
SPEECH RECOGNITION OF ARABIC WORDS USING ARTIFICIAL NEURAL NETWORKS
...Show More Authors

The speech recognition system has been widely used by many researchers using different
methods to fulfill a fast and accurate system. Speech signal recognition is a typical
classification problem, which generally includes two main parts: feature extraction and
classification. In this paper, a new approach to achieve speech recognition task is proposed by
using transformation techniques for feature extraction methods; namely, slantlet transform
(SLT), discrete wavelet transforms (DWT) type Daubechies Db1 and Db4. Furthermore, a
modified artificial neural network (ANN) with dynamic time warping (DTW) algorithm is
developed to train a speech recognition system to be used for classification and recognition
purposes. T

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Al Kut Journal Of Economics And Administrative Sciences
The relationship of demographic diversity to institutional effectiveness An analytical study of a sample of workers in public organizations in Iraq
...Show More Authors

Diversity has become one of the required phenomena to be available within public organizations, in light of the changes taking place in the global and international environment and in various fields. Therefore, it was imperative to study the impact of this phenomenon in various institutions, especially public ones, in most developing countries, including Iraq. The current research aims to analyze the relationship between The demographic diversity and institutional effectiveness of a sample of workers in public institutions included (500) respondents. The questionnaires were distributed to them randomly. Diversity is considered an independent variable and institutional effectiveness a dependent variable. The researcher used interview tools a

... Show More
Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Development of Bridges Maintenance Management System based on Geographic Information System Techniques (Case study: Al-Muthanna \ Iraq)
...Show More Authors

A Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated visualization

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Ieee Transactions On Circuits And Systems I: Regular Papers
Crosstalk-Aware Multiple Error Detection Scheme Based on Two-Dimensional Parities for Energy Efficient Network on Chip
...Show More Authors

Achieving reliable operation under the influence of deep-submicrometer noise sources including crosstalk noise at low voltage operation is a major challenge for network on chip links. In this paper, we propose a coding scheme that simultaneously addresses crosstalk effects on signal delay and detects up to seven random errors through wire duplication and simple parity checks calculated over the rows and columns of the two-dimensional data. This high error detection capability enables the reduction of operating voltage on the wire leading to energy saving. The results show that the proposed scheme reduces the energy consumption up to 53% as compared to other schemes at iso-reliability performance despite the increase in the overhead number o

... Show More
View Publication
Scopus (25)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Indian Journal Of Ecology
Classification of al-hammar marshes satellite images in Iraq using artificial neural network based on coding representation
...Show More Authors

Scopus (2)
Scopus
Publication Date
Sat Mar 31 2018
Journal Name
Journal Of Engineering
Energy and Exergy Analysis of Dual Channel Solar Air Collector with Different Absorber Plates Geometry
...Show More Authors

Flat-plate collector considers most common types of collectors, for ease of manufacturing and low price compared with other collectors. The main aim of the present work is to increase the efficiency of the collector, which can be achieved by improving the heat transfer and minimize heat loss experimentally. Five types of solar air collectors have been tested, which conventional channel with a smooth absorber plate (model I), dual channel with a smooth absorber plate (model II), dual channel with perforating “V” corrugated absorber plate (model III), dual channel with internal attached wire mesh (model Ⅳ), and dual channel with absorber sheet of transparent honeycomb, (model Ⅴ). The dual channel collector used for

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Determination of the lot size using the Wagner-Whitin algorithm under the Constraint Theory / Case Study of Diyala Public Company
...Show More Authors

         International companies are striving to reduce their costs and increase their profits, and these trends have produced many methods and techniques to achieve these goals. these methods is heuristic and the other Optimization.. The research includes an attempt to adapt some of these techniques in the Iraqi companies, and these techniques are to determine the optimal lot size using the algorithms Wagner-Whitin under the theory of constraints. The research adopted the case study methodology to objectively identify the problem of research, namely determining lot size optimal for each of the products of electronic measurement laboratory in Diyala and in light of the bottlenecks in w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Teaching skills for Public and Private Schools’ Teachers: comparative study : Teaching skills for Public and Private Schools’ Teachers: comparative study
...Show More Authors

Abstract:

The great expansion of teaching skills requires finding ways and methods to help teachers acquire experiences of all kinds. The researcher found in the subject of the teaching skills for teachers in public and private schools a fertile field for conducting a study that enables the measurement of these skills. Thus, the study aims to identify the skills of teaching lessons for teachers, the difference in teaching lesson skills for teachers according to the years of service, the differences in teaching lesson skills for teachers according to the specialized teachers and non-specialized teachers, the differences in teaching lesson skills for teachers according to the public and private school. The

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 31 2022
Journal Name
Biodiversitas Journal Of Biological Diversity
Identification of new species record of Cyanophyceae in Diyala River, Iraq based on 16S rRNA sequence data
...Show More Authors

Abstract. Hassan FM, Mahdi WM, Al-Haideri HH, Kamil DW. 2022. Identification of new species record of Cyanophyceae in Diyala River, Iraq based on 16S rRNA sequence data. Biodiversitas 23: 5239-5246. The biodiversity and water quality of the Diyala River require screening water in terms of biological contamination, because it is the only water source in Diyala City and is used for many purposes. This study aimed to identify a new species record of Cynaophyceae and emphasize the importance of using molecular methods beside classic morphological approaches, particularly in the water-shrinkage-aqua system. Five different sites along Diyala River were selected for Cyanophyceae identification. Morphological examination and 16S rRNA sequen

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref