WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steganographic method hides embedded data at various locations in cover irregularly or randomly, whereas the locations of cover for information hiding are not constant, this property will increase the level of security for proposed method. In the proposed method, the sender needs sending a file that has small size via any communication channel and that considered as a key while sending a cover is not necessary to recipient if both agree about downloading it from the internet before sending a file. The contents of this file are invaluable for an attacker. The programming language that used in programming this proposed method is C++ language. Steganographically, The proposed steganographic method is strong and robust. It is possible classifying this proposed method as a public key steganography system and substitution system at the same time.
Background: Significant advancements have been observed in the additive manufacturing (AM) technology industry in recent decades. Due to the inherent variations among each AM manufacturing technique, new areas of investigation continually arise and require consideration. Additionally, the novel applications of additive manufacturing present new difficulties and possibilities for targeted focus. The aim of this manuscript is to conduct a comprehensive literature review that describes the various processing methods, precision levels, types of materials utilized, and potential applications of 3D printing technology in the field of dentistry. Data: An online search was conducted on databases including Research Gate, Google Scholar, and
... Show MoreBelgium is one of the countries that headed towards federalism through a peaceful transition, and over a few decades the country has witnessed deep transformations in its institutions, from a unified and central state in the early nineteenth century to a federal union, regional operations began since 1970 up and constitutionally established its diversity Linguistic and regional, the so -called "state reforms" have been implemented, which led to the emergence of political repercussions. The country has suffered about two decades ago, which caused many national governments that are considered to be among the Luxor in the modern political history of Belgium, However, institutional reforms to achieve the stability of the political system began,
... Show MoreThis research attempts to shed light on a topic that is considered one of the most important topics of HRMs management, which is the Employee centric approach by examining its philosophy and understanding . To achieve the goal, the research relied on the philosophical analytical method, which is one of the approaches used in theoretical studies. The research reached a set of conclusions, the most important of which are the theoretical studies that addressed this entry in the English language and the lack of it in the Arabic language, according to the researcher's knowledge. The research reached a set of recommendations, the most important of which was that this approach needs more research, analysis and study at the practical and th
... Show MoreIncremental sheet forming (ISF) process offers a high degree of flexibility in the manufacturing of different sheet parts, which makes it an ideal candidate for prototype parts as well as efficient at fabricating various customized products at low production costs compared to traditionally used processes. However, parts produced in this process exhibit notable geometrical inaccuracy and considerable thickness reduction. In this paper, the single point incremental sheet forming variant of the process has been implemented to manufacture a highly customized cranial implant starting from the computed tomography (CT) scan data of the patient's anatomy. A methodology, from the modeling to the realization of the implant, is presented and discus
... Show MoreThe marketing of banking service is considered to be one of the impotent fields which showed a universal inebriates . He research showed the comparison between the application of marketing in ideas and application for loot government and private Iraqi bank. The research comets of four parts; Mythology / the concept and the importance of Banking Marketing / Research applichlion/ Conelnion and recommendation.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This study was for searching for Cholera Bacteria serotype which causes epidemiology Cholera in the 2007 in a fast method which contains (Rapid Visual Test) (Crystal V.C.) which was used for the first time in Iraq to diagnosis of Cholera Bacteria & compared with the traditional bacteriology method. The Cholera disease is one of the most dangerous epidemiological diseases which lead to death with a percentage of (50 – 70) % in the severe cases for untreated patients . For this purpose, 100 samples of stool from the patients from a (13) hospitals in Baghdad Governorate in the period from August to the end of December. The Cholera was diagnosis in two methods, 1st method was the fast method using the nitrocellulose which is coated with anti-
... Show More
Abstract
This research aims to identify the relationship and the impact of the behavior of organizational citizenship in the performance of employees, as practiced behaviors organizational citizenship substantial role in achieving the objectives of both the organization and its staff at the same time, so it affects a large extent on the characteristics and performance of individuals employees and thus influence the success of the organization as a whole, problem of the research has indicated that there is a clear failure in the study of the impact of the behavior of organizational citizenship in the performance of employees, was chosen
The researcher focused on the importance of the physical abilities of the tennis game, as this game is one of the games that are characterized by its specificity in performance as this game is characterized by continuous movement and dealing with different elements, so this game requires the development of muscle strength, which plays an important role in Performance skills in the game of tennis. There are several methods to develop strength, including flat hierarchical technique, which is one of the most common forms of training in the development of muscle strength. As for the research problem, the researcher found a method that has an effect on the development of force. Therefore, the researcher tried to diversify a
... Show MoreZeolite Y nanoparticles were synthesized by sol - gel method. Dffirent samples using two silica sources were prepared.
Sodium metasilicate (Na2SiO3) (48% silica) and silicic acid silica (H2SiO3) (75% silica) were employed as silica
source and aluminum nitrate (Al(NO3)3.9H2O) was the aluminum source with tetrapropylammonium hydroxide
(TPAOH) as templating agent.
The synihesized-samples were characterized by X-ray diffraction, showed the requirement of diffirent aging time for
complete crystallization to be achieved. Transmission Electronic Microscope (TEM) images, showed the particles were
in the same range of 30 - 75 nm. FT-IR spectroscory, showed the synthesized samples having the zeolite Y crystal
properties. The i