In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a cover that is digital color image for hiding a text in that selected cover for testing a proposed method of generating the private key. The hiding algorithm used is least significant bit (LSB). Finally, the generated key is tested by hiding process and changing the extension of image, after that notice the generated key is not changed or modified. the Matlap language is used to design and implement a proposed method.
The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show Moreطريقة سهلة وبسيطة ودقيقة لتقدير السبروفلوكساسين في وجود السيفاليكسين او العكس بالعكس في خليط منهما. طبقت الطريقة المقترحة بطريقة الاضافة القياسية لنقطة بنجاح في تقدير السبروفلوكساسين بوجود السيفاليكسين كمتداخل عند الاطوال الموجية 240-272.3 نانوميتر وبتراكيز مختلفة من السبروفلوكساسين 4-18 مايكروغرام . مل-1 وكذلك تقدير السيفاليكسين بوجود السبروفلوكساسين الذي يتداخل باطوال موجية 262-285.7 نانوميتر وبتراكيز مخ
... Show More
XML is being incorporated into the foundation of E-business data applications. This paper addresses the problem of the freeform information that stored in any organization and how XML with using this new approach will make the operation of the search very efficient and time consuming. This paper introduces new solution and methodology that has been developed to capture and manage such unstructured freeform information (multi information) depending on the use of XML schema technologies, neural network idea and object oriented relational database, in order to provide a practical solution for efficiently management multi freeform information system.
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreThe research aims to develop a proposed mechanism for financial reporting on sustainable investment that takes the specificity of these investments.
To achieve this goal, the researcher used (what if scenario) where the future financial statements were prepared for the year 2026, after completion of the sustainable project and operation, as the project requires four years to be completed.
The researcher relied on the results of the researchers collected from various modern sources relevant to the research topic and published on the internet, and the financial data and information obtained to assess the reality of the company's activity and its environmental, social, and economic i
... Show MoreThe research aims to find the impact of a proposed strategy according to the Luria model on realistic thinking among fifth-class scientific students and their achievement in mathematics. To achieve it, the experimental research method and the quasi-experimental design were used for two equal groups, one of them is a control group taught in traditional way and the other is an experimental one taught according to strategy based on Luria model. The research community represents the students of the fifth scientific class from the General Directorate of Education of Karkh First. The research sample (40) students were deliberately chosen and distributed equally between the two groups after making sure that they were equals in their previo
... Show MoreAbstract
The study discussed three areas in strategic thinking, namely, (patterns elements, outcomes) , this study aimed to measure extent to which strategic leaders have the type or types of patterns of strategic thinking, and measure the extent of their use of the elements of strategic thinking, and measurement of strategic thinking outcomes for managers at various levels , And to know the relationship between the modes of strategic thinking, elements and outcomes in organizations. the study included five banks and four hospitals and four colleges and universities, has been a research sample consisted of 168 individuals, distributed in positions (Director General , Director of Directorate , Director of
... Show MoreThe current research aims to evaluate liquidity (as an independent variable) to improve the bank’s profitability (as a dependent variable ), by the bank’s ability to maximize its profits from its business results without excessive bank’s liquidity, so that may affect negatively affects the bank’s reputation and it’s dealers confidence in facing their financial obligations. and this may lead trying to come out among other recommendations including contributing to obtain, the bank’s ability to achieve liquidity balance to maximize its profits. This research has been applied to the sample induced intentionally by choosing three Iraqi private banks. The researcher used financial indicators to assess the bank’s liq
... Show MoreThis research addresses a problem manifested in a main question: what is the role of the digital media in marketing the artistic products? in order to determine the role played by the digital media in the disclosure and promotion of the artistic product, its price and places of distribution, as the basic elements of the marketing mixture.
This is a descriptive research in which the researcher used the survey method to check the opinions of a sample chosen according to the (proportion) method from the research community represented by instructors and students of the college of Fine Arts- University of Dayala.
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show More