In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a cover that is digital color image for hiding a text in that selected cover for testing a proposed method of generating the private key. The hiding algorithm used is least significant bit (LSB). Finally, the generated key is tested by hiding process and changing the extension of image, after that notice the generated key is not changed or modified. the Matlap language is used to design and implement a proposed method.
Objective: to evaluate body image and depression symptoms of children with precocious puberty, and find out association between children`s sociodemographic characteristics and their body image and depression signs. Methodology: A cross sectional study, sample of (80) child from both gender, > 7 years were included due to their ability to express their own feeling, diagnosed with precocious puberty, attending out-patient endocrine clinics at pediatric hospitals in Baghdad city. Data collected, during the period from May to November 2018. Consent form has taken from children and their guardians to participate in study. Child body image scale (CBIS) was used to evaluate children body satisfaction (1) and Mood and feeling questionnaire (M
... Show MoreThe propaganda war is one of the most dangerous weapons used in various conditions of war and peace within any intellectual, political or military conflict to be targeted by multiple social groups and their effects on the intellectuals to change the viewpoints at the local and global level, including the use of technical treatment of the audio and visual medium, The impact of the psychological dimensions of the arms in the confrontation and spread terror in the ranks of the enemies and in the forefront of what Iraq faces in its battle against the And the use of it as a propaganda content contributes to the development of the spirit of tranquility and tranquility in the hearts of Iraqis and the return of the right to the owners “th
... Show MoreE-wallet, also referred to as digital wallet, is a software application designed to replace physical wallets, with the primary purpose of facilitating online transactions when users wish to make virtual payments. Nowadays, E-wallets are not limited to mobile applications, but they have also been extended to wearable devices, such as smartwatches, enabling users to make payments via their watches. This research study focuses on three main E-wallet service providers in Malaysia, namely TouchNGo E-wallet, Boost, and Grab pay, as they are the top three E-wallets in the country. The aim of this paper is to explore the real-world implementation of E-wallets among mobile phone users in Malaysia, employing the Technology Adoption Model as the th
... Show MoreIn this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.
Abstract
This work involves the manufacturing of MAX phase materials include V2AlC and Cr2AlC using powder metallurgy as a new class of materials which characterized by regular crystals in lattice. Corrosion behavior of these materials was investigated by Potentiostat to estimate corrosion resistance and compared with the most resistant material represented by SS 316L. The experiments were carried out in 0.01N of NaOH solution at four temperatures in the range of 30–60oC. Polarization resistance values which calculated by Stern-Geary equation indicated that the MAX phase materials more resistant than SS 316L. Also cyclic polarization tests confirme
... Show MoreABSTRACT The importance and objectives of the study were an attempt to understand the methodology of disseminating radical thought and the reasons of social acceptability that make young people embrace this thought. It also sheds light on the impact of this phenomenon on the regional role of Egypt and examines the strategic means and standards that the Egyptian state focuses on in immunization and prevention of extremism.
Background: Coronavirus pandemic (COVID-19) has enormously affected various healthcare services including the one of community pharmacy. The ramifications of these effects on Iraqi community pharmacies and the measures they have taken to tackle the spread of COVID-19 is yet to be explored. In this cross sectional survey, infection control measures by community pharmacies in Sulaimani city/Iraq has been investigated.
Methods: Community pharmacists were randomly allocated to participate in a cross-sectional survey via visiting their pharmacies and filling up the questionnaire form.
Results and discussion:
... Show MoreThe present study has been carried out to estimate heavy metals mobility, bioconcentration and transfer from polluted soil to roots tissues and from roots tissues to aerial parts using bioconcentration factor and translocation factor. Soil samples and the biomass of the eight vegetable species have been collected during summer season, 2019 from four different sites in Wadi Al-Arg, Taif Governorate, KSA. In general, heavy metals content of soil samples in site III and IV have recorded elevated values compared with those of site I and II. The soil from site IV has shown the highest concentration of Mn, Ni, Cr, Pb, Cu, and Cd amounted 31.63, 14.05, 13.56, 22.79, 31.02 and 2.98 mg/kg dry soil respectively, while the soil from site III has sh
... Show MoreThe ligand Schiff base [(E)-3-(2-hydroxy-5-methylbenzylideneamino)- 1- phenyl-1H-pyrazol-5(4H) –one] with some metals ion as Mn(II); Co(II); Ni(II); Cu(II); Cd(II) and Hg(II) complexes have been preparation and characterized on the basic of mass spectrum for L, elemental analyses, FTIR, electronic spectral, magnetic susceptibility, molar conductivity measurement and functions thermodynamic data study (∆H°, ∆S° and ∆G°). Results of conductivity indicated that all complexes were non electrolytes. Spectroscopy and other analytical studies reveal distorted octahedral geometry for all complexes. The antibacterial activity of the ligand and preparers metal complexes was also studied against gram and negative bacteria.
Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show More