Pub Date : 1900-01-01DOI: 10.34279/0923-009-004-005
R. S. Hameed, Abdul-Wahab Sami Ibrahim
{"title":"Color Halftone Visual Cryptography Scheme Using Dynamic Code Book And Error Diffusion Technique","authors":"R. S. Hameed, Abdul-Wahab Sami Ibrahim","doi":"10.34279/0923-009-004-005","DOIUrl":"https://doi.org/10.34279/0923-009-004-005","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114234049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.34279/0923-009-004-011
Jamal N. Hasoon, Assist. Prof. Dr. Rehab Hassan
Big data refer to the large volume of data, it can be analyzed for strategic Developing and better decisions. Big Data applications exaggerate in near few years because a traditional data techniques be limited specification. Various types of distributions and technologies used to suffer the Big Data challenges are developed. A survey of recent technologies are review for Big Data. The main technologies features are studied enable to extract knowledge from Big Data. Such distributions have some limitations and may differ in offerings and capacities. The used technologies face the increasing multi-streams and Big Data challenges. In this work review the big data technologies and challenge.
{"title":"Big Data Techniques:, A Survey","authors":"Jamal N. Hasoon, Assist. Prof. Dr. Rehab Hassan","doi":"10.34279/0923-009-004-011","DOIUrl":"https://doi.org/10.34279/0923-009-004-011","url":null,"abstract":"Big data refer to the large volume of data, it can be analyzed for strategic Developing and better decisions. Big Data applications exaggerate in near few years because a traditional data techniques be limited specification. Various types of distributions and technologies used to suffer the Big Data challenges are developed. A survey of recent technologies are review for Big Data. The main technologies features are studied enable to extract knowledge from Big Data. Such distributions have some limitations and may differ in offerings and capacities. The used technologies face the increasing multi-streams and Big Data challenges. In this work review the big data technologies and challenge.","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134629943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.34279/0923-009-003-008
S. Shaker, N. A. Hamza
{"title":"3D Face Reconstruction Using Structure From Motion Technique","authors":"S. Shaker, N. A. Hamza","doi":"10.34279/0923-009-003-008","DOIUrl":"https://doi.org/10.34279/0923-009-003-008","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"282 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133350762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.34279/0923-009-003-016
D. Ibrahim
The large challenge of data stored in “cloud computing “is confidence and security since the sensitive data saved into data centers in cloud. These critical data may be accessed, retrieved, or edited by unauthorized person(s) or machine(s). In addition, managing, organization of sensitive data may not be secure. Therefore, the security of data is highly interesting. To increase the security of data in data centers of cloud, we have introduced scheme to ensure data security in "cloud computing" by encoding secret data using two levels of encryption are DES & RSA algorithms. And then to enhancing the security we use LSB algorithm to hide these encrypted data inside edges of color images which is called steganography. The fundamental objective of this paper is to avoid data access by opponent users. This scheme hiding encrypted secret data within images and store these encrypted secret data at the data centers of cloud and retrieves data from it when it is wanted.
{"title":"Enhancing Cloud Computing Security Using Cryptography And Steganography","authors":"D. Ibrahim","doi":"10.34279/0923-009-003-016","DOIUrl":"https://doi.org/10.34279/0923-009-003-016","url":null,"abstract":"The large challenge of data stored in “cloud computing “is confidence and security since the sensitive data saved into data centers in cloud. These critical data may be accessed, retrieved, or edited by unauthorized person(s) or machine(s). In addition, managing, organization of sensitive data may not be secure. Therefore, the security of data is highly interesting. To increase the security of data in data centers of cloud, we have introduced scheme to ensure data security in \"cloud computing\" by encoding secret data using two levels of encryption are DES & RSA algorithms. And then to enhancing the security we use LSB algorithm to hide these encrypted data inside edges of color images which is called steganography. The fundamental objective of this paper is to avoid data access by opponent users. This scheme hiding encrypted secret data within images and store these encrypted secret data at the data centers of cloud and retrieves data from it when it is wanted.","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125877316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.34279/0923-009-003-011
Nawar Ahmed Irsan, Bushra Hammad Amon, Shaymaa S. Samiea
{"title":"Mobile Platform For Various Patients Case's Assessment Via Telemedicine","authors":"Nawar Ahmed Irsan, Bushra Hammad Amon, Shaymaa S. Samiea","doi":"10.34279/0923-009-003-011","DOIUrl":"https://doi.org/10.34279/0923-009-003-011","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115088300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.34279/0923-009-003-013
Z. Ali, Suhad Malallah
{"title":"Multilingual Text Summarization Based On LDA And Modified Pagerank","authors":"Z. Ali, Suhad Malallah","doi":"10.34279/0923-009-003-013","DOIUrl":"https://doi.org/10.34279/0923-009-003-013","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126854417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.34279/0923-009-003-001
طلال ناظم الزهيرى
{"title":"معرف الكائن الرقمي \"DOI\" لوصف وترميز مصادر المعلومات في البيئة الرقمية:, الأهمية والاستخدام","authors":"طلال ناظم الزهيرى","doi":"10.34279/0923-009-003-001","DOIUrl":"https://doi.org/10.34279/0923-009-003-001","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122328452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.34279/0923-009-003-002
عطا محمود عطوه عبدالقادر عبدالقادر
{"title":"موقع الويب ماتريكس ومعاييره المعتمدة في ترتيب المواقع على الإنترنت","authors":"عطا محمود عطوه عبدالقادر عبدالقادر","doi":"10.34279/0923-009-003-002","DOIUrl":"https://doi.org/10.34279/0923-009-003-002","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"87 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129973842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.34279/0923-009-003-012
Amel H. Abbas, L. H. Abbas
{"title":"Reconstructing The Biological Images Using Morphological Processes And Evaluating Using Statistical Features","authors":"Amel H. Abbas, L. H. Abbas","doi":"10.34279/0923-009-003-012","DOIUrl":"https://doi.org/10.34279/0923-009-003-012","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130924962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}