Let R be a ring with identity and M is a unitary left R–module. M is called J–lifting module if for every submodule N of M, there exists a submodule K of N such that
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreAbstract
The research aims to build a training program to develop some executive functions for kindergarten children. To achieve this goal, the two researchers built the program according to the following steps:
1. Determining the general objective of the program.
2. Determining the behavioral objectives of the program.
3. Determining the included content in the program.
4. Implementing the content of the activities of the program.
5. Evaluating the Program.
The program included (12) training activities, the training activities included several items: the title of the activity, the time of implementation of the activity, the general objective of the activity, the procedural behavioral objective, the means and tools u
This research of using Feldspar in the production self compacting concrete (SCC) ( 5,10,15 )% as partial replacement by weight of cement .In this research some of fresh properties of SCC ( slump flow used V-funnel test and filling ability used ( U- box test ) for concrete mixes and also some of the harden properties of SCC ( compressive and flexural tests ). The research results showed that negative effect of Feldspar on the fresh properties of self compacting concrete but the positive effect of Feldspar on the harden properties of self compacting concrete .
Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
And after:
Muslim scholars have fought in the extent of regard to these interests, each according to his opinion and according to his evaluation, and his consideration of this interest, but it remains important that the legislation in them needs more precaution and caution against the predominance of passions, because the passions often decorate spoilers so they see an interest, so practical application must To realize the spirit of Islamic Sharia in its entirety of its rulings, and the preponderance between the interests and evils that prevail in our societies, which c
... Show MoreJudaism followed the approach of monotheism after God Almighty sent Moses (peace be upon him) to convey to them the messages of their Lord, so that they might be on a right guidance and path, but the people did not follow that path.” Love of matter and faith in what is witnessed, so they portrayed the Lord in several images in line with what their souls drew upon them.
This research studies the influence of water source on the compressive strength of high strength concrete. Four types of water source were adopted in both mixing and curing process these are river, tap, well and drainage water (all from Iraq-Diyala governorate). Chemical analysis was carried out for all types of the used water including (pH, total dissolved solids (TDS), Turbidity, chloride, total suspended solid (TSS), and sulfates). Depending on the chemical analysis results, it was found that for all adopted sources the chemical compositions was within the ASTM C 1602/C 1602M-04 limits and can be satisfactorily used in concrete mixtures. Mixture of high strength concrete for compressive strength of (60 MPa) was designed and checked using
... Show MoreWith the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show More