Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
The research entitled "the attitudes of Iraqi People towards the Logic Propaganda for Terrorist Organization such as Daash Regulation, as-Qaida, and Jabhat al-Nasra". It is a field study on the professors and the students of the College of Mass Media at Baghdad University in 2014.
After the global war on terrorism declared on September 11, 2011, the researcher finds it is important to study such subject as it threats the unity and sovereignty of Iraq especially after th
... Show MoreThe research aims to demonstrate the impact of tax techniques on the quality of services provided to income taxpayers by studying the correlational and influencing relationships between the exploited variable (tax techniques) and the dependent variable (the quality of services provided to income taxpayers), and in line with the research objectives, the main hypothesis of the research was formulated (there is a relationship Significance between tax techniques and the quality of services provided to income taxpayers) a number of sub-hypotheses emerged from this hypothesis that were stated in the research methodology, and a number of conclusions were reached, the most important of which were (through the use of the correlation coeff
... Show MoreSoil fertility is a crucial factor in measuring soil quality, it indicates the extent to which soil can support plant life. Soil fertility is measured by the amount of macro and micronutrients, pH, etc. Soil nutrients are depleted after each harvest and therefore must be added. To maintain soil nutrient levels, fertilizer is added to the soil. Adding fertilizer in the precise amount is a matter of great importance because excess or insufficient application can harm plant life and reduce productivity. The use of modern technology is a solution to this problem. Although automated techniques for sowing, weeding, crop harvesting, etc. have been proposed and implemented, none of the techniques are aimed to maintaining soil fertility. The study a
... Show MoreDigital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreScams remain among top cybercrime incidents happening around the world. Individuals with high susceptibility to persuasion are considered as risk-takers and prone to be scam victims. Unfortunately, limited number of research is done to investigate the relationship between appeal techniques and individuals' personality thus hindering a proper and effective campaigns that could help to raise awareness against scam. In this study, the impact of fear and rational appeal were examined as well as to identify suitable approach for individuals with high susceptibility to persuasion. To evaluate the approach, pretest and posttest surveys with 3 separate controlled laboratory experiments were conducted. This study found that rational appeal treatm
... Show MoreThat the structural changes in the environment, business and finance and the spread of business and the diversity of transactions between economic organizations and breadth of a commercial scale in the world have left their clear on the need to keep up with the accounting for these variables as one of the social sciences affect and are affected by the surrounding environment because of the various economic and social factors, technical, legal and others.
As a result of these variables emerged a new field of accounting called Forensic Accounting, which involves the use of expertise of multiple pour in the end to the accounting profession, where the Forensic Accounting cover a large area of disciplines including strengthening
... Show MoreThe organization uses many techniques and methods to ensure that they will succeed and adapted with velocity change in the internal and external environment by decision taking, especially strategic decisions.
Strategic decisions are very important for organization success because it can predict the future and deal with uncertainty, in this circumstances they need accurate and comprehensive information to make effective strategic decision.
To achieve that purpose it must owned successful Strategic Information System ( SIS ) and determined the critical success factors for this system ,which can assisted the worker to focus on the important activities to develop it.
... Show MoreImitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing co
... Show More