In the present work, the analytical study for one of the modern theoretical international models which are used to predict the behavior of transferring radio waves among the transmitting/receiving stations and of affection of these waves by the atmosphere. The analytical study for the application of the REC533 international model has been made in order to reach for the conclusions that enable to forecast the frequencies that can maintain a semi-permanent reliable connection between the transmitting and receiving stations. In this study, Iraq has been adopted generally, whereas, Baghdad was...
In the present work, the analytical study for one of the modern theoretical international models which are used to predict the behavior of transferrin...
The main challenges facing secure image sharing tasks are the increase of sharing volume and sharing-control flexibility. In this book a novel scheme based on transform coding has been developed to perform secret image sharing in the case when the secret image is a colored image with enough sharing control features and as minimum as possible shares sizes. The main signal decomposition attribute of the transform is utilized to divide the secret image into uncorrelated shares, and each share will be separately encrypted
The main challenges facing secure image sharing tasks are the increase of sharing volume and sharing-control flexibility. In this book a novel scheme ...
SMS technology was not designed to transmit secure data; it does not provide built-in support for any security feature (e.g., authentication and confidentiality) between SMS communicators, in this book, a centralized secure messaging system (CSMS) is introduced. It allows the system clients to exchange highly secured messages exclusively via trusted third party (i.e. server). The main server contains a central database that holds clients' information. Depending on this information the server does the required message processing and forwards it to its final destination. The communication of...
SMS technology was not designed to transmit secure data; it does not provide built-in support for any security feature (e.g., authentication and confi...
Phishing (also called brand spoofing or carding) is a technique for acquiring personal or sensitive information; e.g., credit card or bank account numbers and passwords often resulting in fraud; identify theft, and even financial loss. It has been around since 1996 but is becoming more common and more sophisticated. It's a form of cyber-crime that's growing faster than the ability of the police or courts to deal with it. The word "phishing" is simply a play on the word "fishing" - scammers drop email lures into the sea of Internet users, hoping to hook consumers personal information.The...
Phishing (also called brand spoofing or carding) is a technique for acquiring personal or sensitive information; e.g., credit card or bank account num...