Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to a subsystem consisting of an Reversible Logic Gate (RLG) group to obtain the secret keys that are passed to Rivest Shamir Adleman (RSA) to finish encrypting the image. The results indicate that the proposed method has the ability to generate a very large set of highly complex and secure secret keys that can be used later in the encryption stage. Moreover, the number and complexity of those keys will change each time the image is changed, and this represents the contribution of the proposed method. They experienced no time loss throughout the encryption and decryption processes when using RLG, which indicates that the proposed system did a good job in making different keys from the same image. And it differs in the strength of the key from one image to another, depending on the nature of the color imge.
The main objective of this study is to determine the suitable excitation wavelengths for
urine components reaching to select the suitable lasers to execute the auto fluorescence due to their
high intensities. The auto fluorescence was measured at 305, 325 and 350 nm excitation wavelengths
for eleven urine samples which were also analyzed by conventional methods (chemical and
microscopic examination). Data manipulation using Matlab package programming language showed
that urine sample with normal chemical and biological components have emission peaks which are
different from the infected urine samples. Despite the complexity of the composition of urine,
fluorescence maxima can be observed. Most likely, the peaks obser
The density-based spatial clustering for applications with noise (DBSCAN) is one of the most popular applications of clustering in data mining, and it is used to identify useful patterns and interesting distributions in the underlying data. Aggregation methods for classifying nonlinear aggregated data. In particular, DNA methylations, gene expression. That show the differentially skewed by distance sites and grouped nonlinearly by cancer daisies and the change Situations for gene excretion on it. Under these conditions, DBSCAN is expected to have a desirable clustering feature i that can be used to show the results of the changes. This research reviews the DBSCAN and compares its performance with other algorithms, such as the tradit
... Show MoreThe research focuses on determining the role of customer relationship management in improving financial performance by surveying the opinions of a number of employees of a number of Iraqi private banks. The customer has become the focus of attention and the most important factors of success and profitability and competition. Therefore, decisions related to the customer are important decisions that support the process of making, And follow-up of administrative decisions, including financial decisions aimed at improving the financial performance of banks and distinguish them from competitors. Thus, the techniques used in customer relations management programs to collect, analyze and use data and information have beco
... Show MoreAbstract
Business organizations are using the technological innovations like cloud computing (CC) as a developmental platform in order to improve the performance of their information systems. In that context, our paper discusses know-how in employing the public and private CC to serve as platforms to develop the evaluation system of annual employees' performance (ESAEP) at Iraqi universities. Therefore, we ask the paper question which is “Is it possible to adopt the innovative solutions of ICTs (Like: public and private CC) for finding the developmental vision about management information systems at business organizations?”. In addition, the paper aim
... Show MoreCost is the essence of any production process for it is one of the requirements for the continuity of activities so as to increase the profitability of the economic unit and to support the competitive situation in the market. Therefore, there should be an overall control to reduce the cost without compromising the product quality; to achieve this, the management should have detailed credible and reliable information about the cost to be measured, collected, understood and to analyze the causes for the spread of deviations and obstacles the management faces, and to search for the factors that trigger the emergence of these deviations and obstacles
This study aims to identify the role of forensic accounting in the Iraqi environment, banking stability, and to achieve this goal, we used the field survey method, as it is the most appropriate for studying the phenomenon in question and achieving its objectives.
Where we selected a sample consisting of (50) male and female employees, distributed among five private banks in Baghdad governorate, namely (Ashur International Bank, Development Investment Bank, Iraqi Middle East Investment Bank, Hammurabi Commercial Bank, Khaleej Commercial Bank), and the questionnaire tool was applied to them Designed for this purpose, which consisted of
... Show MoreThe work in this paper involves the planning, design and implementation of a mobile learning system called Nahrain Mobile Learning System (NMLS). This system provides complete teaching resources, which can be accessed by the students, instructors and administrators through the mobile phones. It presents a viable alternative to Electronic learning. It focuses on the mobility and flexibility of the learning practice, and emphasizes the interaction between the learner and learning content. System users are categorized into three categories: administrators, instructors and students. Different learning activities can be carried out throughout the system, offering necessary communication tools to allow the users to communicate with each other
... Show MoreWith the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and s
... Show More The current research aims to highlight the role of human resource management with its practices (human resource planning, selection and placement, training and development, performance evaluation, compensation, and incentives) in raising the level of individuals' performance and its dimensions (task performance, contextual performance, unproductive work behavior, and adaptive performance) by explaining the research problem, which can be limited to the low level of performance of individuals, where the researchers use the descriptive analytical approach and the SPSS program in the practical aspect of the research community represented by the general manager and his assistant
Cloud computing is the new technological trend for future generations. It represents a new way to use IT resources more efficiently. Cloud computing is one of the most technological models for developing and exploiting infrastructure resources in the world. Under the cloud, the user no longer needs to look for major financing to purchase infrastructure equipment as companies, especially small and medium-sized ones, can get the equipment as a service, rather than buying it as a product. The idea of cloud computing dates back to the sixties of the last century, but this idea did not come into actual application until the beginning of the third millennium, at the hands of technology companies such as Apple, Hp, IBM, which had
... Show More