首页 > 最新文献

المجلة العراقية لتكنولوجيا المعلومات最新文献

英文 中文
Color Halftone Visual Cryptography Scheme Using Dynamic Code Book And Error Diffusion Technique 采用动态码本和错误扩散技术的彩色半色调视觉密码方案
Pub Date : 1900-01-01 DOI: 10.34279/0923-009-004-005
R. S. Hameed, Abdul-Wahab Sami Ibrahim
{"title":"Color Halftone Visual Cryptography Scheme Using Dynamic Code Book And Error Diffusion Technique","authors":"R. S. Hameed, Abdul-Wahab Sami Ibrahim","doi":"10.34279/0923-009-004-005","DOIUrl":"https://doi.org/10.34279/0923-009-004-005","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114234049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Big Data Techniques:, A Survey 大数据技术:调查
Pub Date : 1900-01-01 DOI: 10.34279/0923-009-004-011
Jamal N. Hasoon, Assist. Prof. Dr. Rehab Hassan
Big data refer to the large volume of data, it can be analyzed for strategic Developing and better decisions. Big Data applications exaggerate in near few years because a traditional data techniques be limited specification. Various types of distributions and technologies used to suffer the Big Data challenges are developed. A survey of recent technologies are review for Big Data. The main technologies features are studied enable to extract knowledge from Big Data. Such distributions have some limitations and may differ in offerings and capacities. The used technologies face the increasing multi-streams and Big Data challenges. In this work review the big data technologies and challenge.
大数据是指大量的数据,它可以分析战略发展和更好的决策。由于传统数据技术规范的限制,大数据的应用在近几年内将会扩大。各种类型的分布和技术被用来应对大数据的挑战。对大数据的最新技术进行了综述。研究了从大数据中提取知识的主要技术特点。这些发行版有一些限制,可能在产品和功能上有所不同。所使用的技术面临着越来越多的多流和大数据的挑战。本文综述了大数据技术及其面临的挑战。
{"title":"Big Data Techniques:, A Survey","authors":"Jamal N. Hasoon, Assist. Prof. Dr. Rehab Hassan","doi":"10.34279/0923-009-004-011","DOIUrl":"https://doi.org/10.34279/0923-009-004-011","url":null,"abstract":"Big data refer to the large volume of data, it can be analyzed for strategic Developing and better decisions. Big Data applications exaggerate in near few years because a traditional data techniques be limited specification. Various types of distributions and technologies used to suffer the Big Data challenges are developed. A survey of recent technologies are review for Big Data. The main technologies features are studied enable to extract knowledge from Big Data. Such distributions have some limitations and may differ in offerings and capacities. The used technologies face the increasing multi-streams and Big Data challenges. In this work review the big data technologies and challenge.","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134629943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
3D Face Reconstruction Using Structure From Motion Technique 基于运动结构的三维人脸重建技术
Pub Date : 1900-01-01 DOI: 10.34279/0923-009-003-008
S. Shaker, N. A. Hamza
{"title":"3D Face Reconstruction Using Structure From Motion Technique","authors":"S. Shaker, N. A. Hamza","doi":"10.34279/0923-009-003-008","DOIUrl":"https://doi.org/10.34279/0923-009-003-008","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"282 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133350762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Cloud Computing Security Using Cryptography And Steganography 利用密码学和隐写术增强云计算安全性
Pub Date : 1900-01-01 DOI: 10.34279/0923-009-003-016
D. Ibrahim
The large challenge of data stored in “cloud computing “is confidence and security since the sensitive data saved into data centers in cloud. These critical data may be accessed, retrieved, or edited by unauthorized person(s) or machine(s). In addition, managing, organization of sensitive data may not be secure. Therefore, the security of data is highly interesting. To increase the security of data in data centers of cloud, we have introduced scheme to ensure data security in "cloud computing" by encoding secret data using two levels of encryption are DES & RSA algorithms. And then to enhancing the security we use LSB algorithm to hide these encrypted data inside edges of color images which is called steganography. The fundamental objective of this paper is to avoid data access by opponent users. This scheme hiding encrypted secret data within images and store these encrypted secret data at the data centers of cloud and retrieves data from it when it is wanted.
存储在“云计算”中的数据面临的最大挑战是信心和安全性,因为敏感数据存储在云数据中心中。这些关键数据可能被未经授权的人员或机器访问、检索或编辑。此外,管理和组织敏感数据可能不安全。因此,数据的安全性是非常有趣的。为了提高云数据中心数据的安全性,我们引入了一种方案,通过使用DES和RSA两级加密算法对秘密数据进行编码,确保“云计算”中的数据安全。然后,为了提高安全性,我们使用LSB算法将加密后的数据隐藏在彩色图像的边缘内,称为隐写术。本文的基本目标是避免对手用户访问数据。该方案将加密的秘密数据隐藏在图像中,并将这些加密的秘密数据存储在云的数据中心,并在需要时从中检索数据。
{"title":"Enhancing Cloud Computing Security Using Cryptography And Steganography","authors":"D. Ibrahim","doi":"10.34279/0923-009-003-016","DOIUrl":"https://doi.org/10.34279/0923-009-003-016","url":null,"abstract":"The large challenge of data stored in “cloud computing “is confidence and security since the sensitive data saved into data centers in cloud. These critical data may be accessed, retrieved, or edited by unauthorized person(s) or machine(s). In addition, managing, organization of sensitive data may not be secure. Therefore, the security of data is highly interesting. To increase the security of data in data centers of cloud, we have introduced scheme to ensure data security in \"cloud computing\" by encoding secret data using two levels of encryption are DES & RSA algorithms. And then to enhancing the security we use LSB algorithm to hide these encrypted data inside edges of color images which is called steganography. The fundamental objective of this paper is to avoid data access by opponent users. This scheme hiding encrypted secret data within images and store these encrypted secret data at the data centers of cloud and retrieves data from it when it is wanted.","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125877316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Computer –Based Intruder Detection Alarm System 基于计算机的入侵检测报警系统
Pub Date : 1900-01-01 DOI: 10.34279/0923-009-003-009
Izz Aboud Kadum, A. Altimimy, A. Hassan
{"title":"Computer –Based Intruder Detection Alarm System","authors":"Izz Aboud Kadum, A. Altimimy, A. Hassan","doi":"10.34279/0923-009-003-009","DOIUrl":"https://doi.org/10.34279/0923-009-003-009","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115628747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Platform For Various Patients Case's Assessment Via Telemedicine 基于远程医疗的各类患者病例评估移动平台
Pub Date : 1900-01-01 DOI: 10.34279/0923-009-003-011
Nawar Ahmed Irsan, Bushra Hammad Amon, Shaymaa S. Samiea
{"title":"Mobile Platform For Various Patients Case's Assessment Via Telemedicine","authors":"Nawar Ahmed Irsan, Bushra Hammad Amon, Shaymaa S. Samiea","doi":"10.34279/0923-009-003-011","DOIUrl":"https://doi.org/10.34279/0923-009-003-011","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115088300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multilingual Text Summarization Based On LDA And Modified Pagerank 基于LDA和改进Pagerank的多语言文本摘要
Pub Date : 1900-01-01 DOI: 10.34279/0923-009-003-013
Z. Ali, Suhad Malallah
{"title":"Multilingual Text Summarization Based On LDA And Modified Pagerank","authors":"Z. Ali, Suhad Malallah","doi":"10.34279/0923-009-003-013","DOIUrl":"https://doi.org/10.34279/0923-009-003-013","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126854417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
معرف الكائن الرقمي "DOI" لوصف وترميز مصادر المعلومات في البيئة الرقمية:, الأهمية والاستخدام 数字“DOI”用于描述和编码数字环境中的信息来源:重要性和用途
Pub Date : 1900-01-01 DOI: 10.34279/0923-009-003-001
طلال ناظم الزهيرى
{"title":"معرف الكائن الرقمي \"DOI\" لوصف وترميز مصادر المعلومات في البيئة الرقمية:, الأهمية والاستخدام","authors":"طلال ناظم الزهيرى","doi":"10.34279/0923-009-003-001","DOIUrl":"https://doi.org/10.34279/0923-009-003-001","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122328452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
موقع الويب ماتريكس ومعاييره المعتمدة في ترتيب المواقع على الإنترنت 黑客帝国及其网站排名标准
Pub Date : 1900-01-01 DOI: 10.34279/0923-009-003-002
عطا محمود عطوه عبدالقادر عبدالقادر
{"title":"موقع الويب ماتريكس ومعاييره المعتمدة في ترتيب المواقع على الإنترنت","authors":"عطا محمود عطوه عبدالقادر عبدالقادر","doi":"10.34279/0923-009-003-002","DOIUrl":"https://doi.org/10.34279/0923-009-003-002","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"87 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129973842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconstructing The Biological Images Using Morphological Processes And Evaluating Using Statistical Features 利用形态学过程重建生物图像并利用统计特征进行评价
Pub Date : 1900-01-01 DOI: 10.34279/0923-009-003-012
Amel H. Abbas, L. H. Abbas
{"title":"Reconstructing The Biological Images Using Morphological Processes And Evaluating Using Statistical Features","authors":"Amel H. Abbas, L. H. Abbas","doi":"10.34279/0923-009-003-012","DOIUrl":"https://doi.org/10.34279/0923-009-003-012","url":null,"abstract":"","PeriodicalId":422374,"journal":{"name":"المجلة العراقية لتكنولوجيا المعلومات","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130924962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
المجلة العراقية لتكنولوجيا المعلومات
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1