|
|
|
Ibtisam A. Aljazaery,Haider Th. Salim Alrikabi,Mustafa Rabea Aziz
Pág. pp. 34 - 47
One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an algorithm...
ver más
|
|
|
|
|
|
|
Abdul Hadi M. Alaidi,Ibtisam A. Aljazaery,Haider TH. Salim Alrikabi,Ibrahim Nasir Mahmood,Faisal Theyab Abed
Pág. pp. 32 - 40
In Iraq, the number of people who own vehicles has grown up significantly. However, this increment in vehicles number doesn?t accomplished by a study of roads and intersections expansion. As a result, traffic jams became a big problem that led to long wa...
ver más
|
|
|
|