In this paper, we describe the cases of marriage and divorce in the city of Baghdad on both sides of Rusafa and Karkh, we collected the data in this research from the Supreme Judicial Council and used the cubic spline interpolation method to estimate the function that passing through given points as well as the extrapolation method which was applied for estimating the cases of marriage and divorce for the next year and comparison between Rusafa and Karkh by using the MATLAB program.
Pulsed laser ablation in liquid (PLAL) technique can produce high purity nanoparticles, it is a top-down physical method based on the principle of dividing metal ion bulk precursors into metal atoms, this method was used in this work to synthesis cobalt nanoparticals (CoPNs) with the use of Nd: YAG laser with two wavelengths (355 nm) and (532 nm) at energies (500 mJ) and (600 mJ) respectively, with number of pulses (1000,1100, 1200, 1300, and 1400) for each wavelength. The properties of the prepared nanoparticles were studied by UV-Vis, XRD, SEM with EDX, AFM, and FTIR analysis and then its antibacterial activity was studied by applying it on two types of bacteria with gram-positive (Staphylococcus aureus, Streptococc
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreChacha 20 is a stream cypher that is used as lightweight on many CPUs that do not have dedicated AES instructions. As stated by Google, that is the reason why they use it on many devices, such as mobile devices, for authentication in TLS protocol. This paper proposes an improvement of chaha20 stream cypher algorithm based on tent and Chebyshev functions (IChacha20). The main objectives of the proposed IChacha20 algorithm are increasing security layer, designing a robust structure of the IChacha20 to be enabled to resist various types of attacks, implementing the proposed algorithm for encryption of colour images, and transiting it in a secure manner. The test results proved that the MSE, PSNR, UQI and NCC metrics
... Show MoreThe aim of this paper is to construct cyclic subgroups of the projective general linear group over from the companion matrix, and then form caps of various degrees in . Geometric properties of these caps as secant distributions and index distributions are given and determined if they are complete. Also, partitioned of into disjoint lines is discussed.
Speech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. R
... Show MoreThe hydrolysis of urea by the enzyme urease is significant for increasing the irroles in human pathogenicity, biocementation, soil fertilizer, and subsequently in soil improvement. This study devoted to the isolation of urease from urea-rich soil samples collected from seven different locations. Isolation of the various bacterial species was conducted using nutrient agar. The identity of isolated urease was based on morphological characteristics and standard microbiological and biochemical procedures. The urease producing strains of bacteria were obtained using the urease hydrolysis test. The bacterial isolates produced from soil samples collected from different environments and treat