Preferred Language
Articles
/
jeasiq-2120
Enhancing national security through foreseeing the economic intelligence system in Iraq
...Show More Authors

 

         Economic intelligence represents a modern field of knowledge that has been and is still the focus of many studies and research, including this research that deals with economic intelligence and its role in strengthening Iraqi national security - an analytical study. Economic development and economic development without security, and in a situation such as that of Iraq, which is still suffering from conflicts, conflicts and the effects of wars, as well as the unstable conditions in its regional environment, the directions of that relationship cannot be determined except through the availability of accurate information, indicators, full knowledge of reality and the possibility of exploring future possibilities

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Nov 12 2018
Journal Name
Arab Science Heritage Journal
عمارة عمارة المشهد الحسيني المقدس في ضوء رسومات المطراقي زادة (941ه/1534م) " دراسة تحليلية "
...Show More Authors

   The drawings of The travelers artist is important historical document and sources for  important information about The most of The city and building and different Islamic art which idling  because of different causes like wars and destruction or natural causes and disasters like eruptions and earthquakes and floods  which we cannot make a clear form about the buildings  mapping in later period .

View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
منظمات الاداء العالي بحث أستطلاعي في الشركة العامة للصناعات الجلدية والشركة العامة لتصنيع الحبوب
...Show More Authors

This study discussed modern variable in the organizational thought that is the high performance organizations in the two of Iraqi public organizations. The aim of study determines to know the level of the performance in this organizations (high or not). The data was Collected by questionnaire which contain (8) characteristics, the organizational design, strategy, process, technology, leadership, the roles, culture, and external environment). The sample contain from (76) employees;

Results points that the two organizations didn’t reach to the high level of performance, and there are significance's difference  among them.

 

 

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 26 2023
Journal Name
Wasit Journal Of Pure Sciences
Covid-19 Prediction using Machine Learning Methods: An Article Review
...Show More Authors

The COVID-19 pandemic has necessitated new methods for controlling the spread of the virus, and machine learning (ML) holds promise in this regard. Our study aims to explore the latest ML algorithms utilized for COVID-19 prediction, with a focus on their potential to optimize decision-making and resource allocation during peak periods of the pandemic. Our review stands out from others as it concentrates primarily on ML methods for disease prediction.To conduct this scoping review, we performed a Google Scholar literature search using "COVID-19," "prediction," and "machine learning" as keywords, with a custom range from 2020 to 2022. Of the 99 articles that were screened for eligibility, we selected 20 for the final review.Our system

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Oct 25 2022
Journal Name
Minar Congress 6
HANDWRITTEN DIGITS CLASSIFICATION BASED ON DISCRETE WAVELET TRANSFORM AND SPIKE NEURAL NETWORK
...Show More Authors

In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database

View Publication Preview PDF
Publication Date
Wed Jun 01 2011
Journal Name
Political Sciences Journal
السياسة الروسية في الشرق الاوسط الكبير او (فن اقامة علاقات الصداقة مع كل دول العالم )
...Show More Authors

السياسة الروسية في الشرق الاوسط الكبير او (فن اقامة علاقات الصداقة مع كل دول العالم)

View Publication Preview PDF
Crossref
Publication Date
Tue Nov 06 2018
Journal Name
Arab Science Heritage Journal
التخطيط التخطيط العمراني والسكاني لمدينة بغداد في عهد الوالي العثماني محمد رشيد الكوزلكي 1852-1857
...Show More Authors

I've dealt with my research is marked by ((urban and population planning for the city of Baghdad, during the reign of the Ottoman governor Muhammad Rashid Alkozlki 1852-1857)), a set of facts and incidents historical with the physical and demographic dimension, which passed on the history of the city of Baghdad on the fifth of the nineteenth century the contract during the Ottoman control Iraq, which lasted almost nearly four centuries

View Publication Preview PDF