Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 29 2025
Journal Name
Al–bahith Al–a'alami
Information Pollution in Iraqi Journalism…Study in Causes and Sources - A research drawn from a Master Degree thesis
...Show More Authors

Information pollution is regarded as a big problem facing journalists working in the editing section, whereby journalistic materials face such pollution through their way across the editing pyramid. This research is an attempt to define the concept of journalistic information pollution, and what are the causes and sources of this pollution. The research applied the descriptive research method to achieve its objectives. A questionnaire was used to collect data. The findings indicate that journalists are aware of the existence of information pollution in journalism, and this pollution has its causes and resources.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 30 2025
Journal Name
Mustansiriyah Journal Of Pure And Applied Sciences
Secure E-voting authentication system employing biometric technology, Crypto-Watermarking Approach and blockchain technology: A Review
...Show More Authors

Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or

... Show More
View Publication
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Computers, Materials & Continua
Improving Video Watermarking through Galois Field <i>GF</i>(2<sup>4</sup>) Multiplication Tables with Diverse Irreducible Polynomials and Adaptive Techniques
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Apr 17 2017
Journal Name
Wireless Personal Communications
ITPMAP: An Improved Three-Pass Mutual Authentication Protocol for Secure RFID Systems
...Show More Authors

View Publication
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Teaching skills for Public and Private Schools’ Teachers: comparative study : Teaching skills for Public and Private Schools’ Teachers: comparative study
...Show More Authors

Abstract:

The great expansion of teaching skills requires finding ways and methods to help teachers acquire experiences of all kinds. The researcher found in the subject of the teaching skills for teachers in public and private schools a fertile field for conducting a study that enables the measurement of these skills. Thus, the study aims to identify the skills of teaching lessons for teachers, the difference in teaching lesson skills for teachers according to the years of service, the differences in teaching lesson skills for teachers according to the specialized teachers and non-specialized teachers, the differences in teaching lesson skills for teachers according to the public and private school. The

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Estimation and Improvement of Routing Protocol Mobile Ad-Hoc Network Using Fuzzy Neural Network
...Show More Authors

Ad-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol depends on QoS using two types of applications (+ve and –ve QoS in the FIS evaluation). QoS of the protocol varies from one prot

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Determination of the lot size using the Wagner-Whitin algorithm under the Constraint Theory / Case Study of Diyala Public Company
...Show More Authors

         International companies are striving to reduce their costs and increase their profits, and these trends have produced many methods and techniques to achieve these goals. these methods is heuristic and the other Optimization.. The research includes an attempt to adapt some of these techniques in the Iraqi companies, and these techniques are to determine the optimal lot size using the algorithms Wagner-Whitin under the theory of constraints. The research adopted the case study methodology to objectively identify the problem of research, namely determining lot size optimal for each of the products of electronic measurement laboratory in Diyala and in light of the bottlenecks in w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 29 2025
Journal Name
Al–bahith Al–a'alami
"THE COMMUNICATOR AND THE FACTORS INFLUENCING HIS JOB IN UNIVERSITY PRESS": " A survey study of the managers of administrative departments of public relations and media at Iraqi Universities. "
...Show More Authors

The research problem lies in the lack of accurate scientific perceptions concerning the reality of the communicator and the factors influencing his job. The research is aimed at introducing the communicator in the university press, clarifying the obstacles facing him, and uncovering the level of his job satisfaction and his visions of developing his work.

The researcher adopted the survey method in the collection, analysis, and interpretation of the data using a questionnaire.

 A set of results and conclusions has been reached, most importantly are:

 

*The communicator performs multiple missions including writing, editing, and collecting info

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Application of data content analysis (DEA) technology to evaluate performance efficiency: applied research in the General Tax Authority
...Show More Authors

The aim of the research is to use the data content analysis technique (DEA) in evaluating the efficiency of the performance of the eight branches of the General Tax Authority, located in Baghdad, represented by Karrada, Karkh parties, Karkh Center, Dora, Bayaa, Kadhimiya, New Baghdad, Rusafa according to the determination of the inputs represented by the number of non-accountable taxpayers and according to the categories professions and commercial business, deduction, transfer of property ownership, real estate and tenders, In addition to determining the outputs according to the checklist that contains nine dimensions to assess the efficiency of the performance of the investigated branches by investing their available resources T

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Modeling The Power Grid Network Of Iraq
...Show More Authors

Recently, the theory of Complex Networks gives a modern insight into a variety of applications in our life. Complex Networks are used to form complex phenomena into graph-based models that include nodes and edges connecting them. This representation can be analyzed by using network metrics such as node degree, clustering coefficient, path length, closeness, betweenness, density, and diameter, to mention a few. The topology of the complex interconnections of power grids is considered one of the challenges that can be faced in terms of understanding and analyzing them. Therefore, some countries use Complex Networks concepts to model their power grid networks. In this work, the Iraqi Power Grid network (IPG) has been modeled, visua

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref