WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steganographic method hides embedded data at various locations in cover irregularly or randomly, whereas the locations of cover for information hiding are not constant, this property will increase the level of security for proposed method. In the proposed method, the sender needs sending a file that has small size via any communication channel and that considered as a key while sending a cover is not necessary to recipient if both agree about downloading it from the internet before sending a file. The contents of this file are invaluable for an attacker. The programming language that used in programming this proposed method is C++ language. Steganographically, The proposed steganographic method is strong and robust. It is possible classifying this proposed method as a public key steganography system and substitution system at the same time.
Gumbel distribution was dealt with great care by researchers and statisticians. There are traditional methods to estimate two parameters of Gumbel distribution known as Maximum Likelihood, the Method of Moments and recently the method of re-sampling called (Jackknife). However, these methods suffer from some mathematical difficulties in solving them analytically. Accordingly, there are other non-traditional methods, like the principle of the nearest neighbors, used in computer science especially, artificial intelligence algorithms, including the genetic algorithm, the artificial neural network algorithm, and others that may to be classified as meta-heuristic methods. Moreover, this principle of nearest neighbors has useful statistical featu
... Show MoreOne of the biomedical image problems is the appearance of the bubbles in the slide that could occur when air passes through the slide during the preparation process. These bubbles may complicate the process of analysing the histopathological images. The objective of this study is to remove the bubble noise from the histopathology images, and then predict the tissues that underlie it using the fuzzy controller in cases of remote pathological diagnosis. Fuzzy logic uses the linguistic definition to recognize the relationship between the input and the activity, rather than using difficult numerical equation. Mainly there are five parts, starting with accepting the image, passing through removing the bubbles, and ending with predict the tissues
... Show MoreThe presence of research Repositories in the intellectual production of universities and their availability through their websites or through their scientific institutions is one of the criteria for evaluating these universities in the international classifications of the best universities, in addition to preserving the intellectual output of these universities for a long time and safely and preserving the property rights of researchers. And made them available through their websites. The purpose of this research is to identify the concept of digital content and research repositories and its origin, and to indicate the importance of its existence through the websites of universities and their types, and to identify the research repositories
... Show MoreThe research problem revolves around the Iraqi public's use of digital television and cinematic websites، and their importance to the academic study and society، as it examines the public's relationship with these websites، usage habits، and the reasons for their interaction with them. And for the prevalence of this phenomenon of use، it was necessary to address the intensity، intentionality، and timing of use to theoretically root the subject of the study، which is one of the modern studies in Iraq and the Arab world. The survey approach، where the research was based on the theory of uses and gratifications that confer positivity and activity on the mass media audience.
The researchers designed
... Show MoreThis paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ
... Show MoreBackground: Otitis media with effusion is characterized by accumulation of fluid in the middle ear in absence of acute inflammation and it is the most common cause of acquired hearing loss in children, and may negatively affect language development failure of medical treatment of middle ear effusion frequently require myringotomy and tympanostomy tube insertion.
Objectives: To determine tympanostomy tube complications of tube in children with chronic otitis media with effusion who were treated with Shah Grommet tube insertion.
Methods: The Medical records of 162 ears of 87 children (52 male and 35 female) were reviewed respectively, the patients ages wer
... Show MoreThe aim of the present research is to study the dissolution and transport process of
benzene as a light nonaqueous phase liquid (LNAPL) in saturated porous media.
Unidirectional flow at water velocities ranged from 0.90 to 3.60 cm/hr was adopted to study
this process in a three dimensional saturated sand tank (100 cm×40 cm×35 cm). This tank
represents a laboratory-scale aquifer. The aquifer was constructed by packing homogeneous
sand in the rectangular tank. The experimental results were used to characterize the
dissolution behavior of an entrapped nonaqueous phase benzene source in a three dimensional
aquifer model. The time invariant average mass transfer coefficient was determined at each
interstitial velocit
The Supreme Judicial Council decided on July 3, 2003, to set up a court to deal with the issues of publication and media. This court tries to solve the problems of media and publishing in both its civil and penal aspects. The decision of establishing the court represents a new and important step to be taken by the Iraqi Judicial Council for the tremendous development witnessed by media sector in general and press in particular especially after 2003.
This study includes two main axes: the first one deals with the most important crimes of publication in the Iraqi legislations such as the crimes of defamation, libel, insult, indecency, and incitement; the second deals with an analytical survey of the completed cases i.e. the issues tha
This paper provides a review of scholarly research on the depiction of hostility in critical media discourse analysis. The study is intended to analyze how hostility is differently portrayed and manifested in media discourse. The review begins by defining the multifaceted concept of hostility, encompassing cognitive, emotive, and behavioral dimensions. It then outlines the systematic process used to identify, gather and purposely select 30 relevant articles to hostility in media discourse. The method involves selecting 100 initial articles and gradually refining them to 30 articles that specifically address the themes of racism, anger, hate speech, prejudice, and aggression. These articles are sourced from diverse academic journals
... Show MoreNanofluids (dispersion of nanoparticles in a base fluid) have been suggested as promising agents in subsurface industries including enhanced oil recovery. Nanoparticles can easily pass through small pore throats in reservoirs formations; however, physicochemical interactions between nanoparticles and between nanoparticles and rocks can cause a significant retention of nanoparticles. This study investigated the transport, attach, and retention of silica nanoparticles in core plugs. The hydrophilic silica nanoparticles were injected into limestone core as nanofluid of different nanoparticles size (5 nm, and 20 nm), concentration (0.005 – 0.1 wt% SiO2), and base fluid salinity (0 – 3 wt% NaCl) at different temperatures (23, and 50 °C). D
... Show More