Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
Amebiasis, related to the pathogenic parasite Entamoeba histolytica, is a prominent cause of diarrhea globally. Amebiasis is primarily a disease of impoverished communities in developing nations, although it has recently arisen as a significant infection among returning tourists and immigrants. Severe cases are linked to a high case fatality rate. Although polymerase chain reaction (PCR)-based diagnosis is becoming more widely available, it is still underutilized. Treatment with nitroimidazoles is now suggested, however novel parasite medication research is a top priority. To avoid problems, amebiasis should be considered before corticosteroid therapy. Because there is no effective vaccination, sanitation and availability to clean w
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
This work presents the simulation of a Low density Parity Check (LDPC) coding scheme with
multiuserMulti-Carrier Code Division Multiple Access (MC-CDMA) system over Additive White
Gaussian Noise (AWGN) channel and multipath fading channels. The decoding technique used in
the simulation was iterative decoding since it gives maximum efficiency with ten iterations.
Modulation schemes that used are Phase Shift Keying (BPSK, QPSK and 16 PSK), along with the
Orthogonal Frequency Division Multiplexing (OFDM). A 12 pilot carrier were used in the estimator
to compensate channel effect. The channel model used is Long Term Evolution (LTE) channel with
Technical Specification TS 25.101v2.10 and 5 MHz bandwidth including the chan
Within the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo
... Show MoreCarbonate reservoirs are an essential source of hydrocarbons worldwide, and their petrophysical properties play a crucial role in hydrocarbon production. Carbonate reservoirs' most critical petrophysical properties are porosity, permeability, and water saturation. A tight reservoir refers to a reservoir with low porosity and permeability, which means it is difficult for fluids to move from one side to another. This study's primary goal is to evaluate reservoir properties and lithological identification of the SADI Formation in the Halfaya oil field. It is considered one of Iraq's most significant oilfields, 35 km south of Amarah. The Sadi formation consists of four units: A, B1, B2, and B3. Sadi A was excluded as it was not filled with h
... Show MoreThe main aim of this paper is to explain the effect of the aggregation accounting information on the financial, investment, and operational, managerial decision-making and the evaluation of the financial statements after aggregate. The problem of this study is represented in administrative decision-making that takes place under differentiated accounting systems operating within a governmental economic unit that seeks at the same time to achieve a unified vision and goals for the organization. This study was conducted at the College of Administration and Economics /University of Baghdad, and it represents a sample from a community of governmental economic units that apply differentiated accounting systems. The study method is repr
... Show MoreThe ability of insurance companies to achieve goals depends on their ability to meet customers' requirements, and this requires them to identify target markets and respond to needs and wishes of the markets, the skill is to convince the company to operate what is in the interest of the customer if he is convinced the customer service provided to him, he would repeat to deal with, and where the cost of maintaining existing customers is less than the cost of attracting new customers, the insurance companies that is working hard to maintain their customers, the more customer satisfaction with the services provided has increased loyalty and weakened the ability of competitors lured.
&nbs
... Show Moreيتناول هذا المقال تصورًا مستقبليًا لمؤسسات المعلومات في عام 2050، حيث يستعرض كيف ستتغير بنيتها لتصبح ذكية ومستدامة، ويستعرض دور أخصائي المعلومات في بيئة رقمية متقدمة. كما يناقش تطور مصادر المعلومات وخدماتها، ونُظم تنظيمها، بالإضافة إلى تنوع المستفيدين، مع إبراز دور هذه المؤسسات في دعم التنمية المستدامة
Increasing interest in planning at the level of government units as a means to manage the physical and human resources, direct and invest in areas that would include an increase in the economies of the general government units that are part of the general economics of the state.The research problem lies in the introduction of the factors influencing the ongoing expenses that adversely affect the financial planning process at the level of the Ministry of Health Planning, which affects the quality of services provided to citizens, so I sought the researchers to study the reality of financial planning in some of the Ministry of Health and health departments through the analysis of current budgets and diagnose deviations in the implementatio
... Show Moreاتسعت دائرة استخدام نظم المعلومات بشكل كبير بحيث دخلت كل مفاصل حياة الانسان المختلفة مما جعل فرص انتهاك واختراق تلك الانظمة امراً لامناص منه. لذلك فان الحاجة تستدعي ايجاد وسائل تقنية واطر جوهرية للتصدي لظاهرة حدوث أي خلل في نظم المعلومات من خلال مراجعة وتدقيق دورة حياة النظام.
يتطرق البحث الى جملة ادوات واساليب تقنية تساعد المدققين والمراجعين من تحديد الخلل وطبيعته وايجاد حل له . كما توفر
... Show More