In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a cover that is digital color image for hiding a text in that selected cover for testing a proposed method of generating the private key. The hiding algorithm used is least significant bit (LSB). Finally, the generated key is tested by hiding process and changing the extension of image, after that notice the generated key is not changed or modified. the Matlap language is used to design and implement a proposed method.
The article characterizes metaphors and comparisons as a means of rethinking the phenomena of the surrounding world; two directions are named within which metaphors and comparisons are studied: 1) the linguo-classification direction combines several classifications of metaphors and comparisons, which are basically focused on comparing two denotations through the meanings of word forms that are part of the trope; 2) the theoretical and conceptual direction is associated with the concept of conceptual displacement and is the basis of the theoretical and methodological study of metaphor and comparison, i.e. the modern theory of metaphor is being formed; The main attention is focused on the comparative concept of Aristotle, which postul
... Show MoreThis research includes a detailed morphological description of the Pollenia mesopotamica sp. nov. in Iraq. Locality, host plant and data of collection were given.
Simulation of free convection heat transfer in a square enclosure induced by heated thin plate is represented numerically. All the enclosure walls have constant temperature lower than the plate’s temperature. The flow is assumed to be two-dimensional. The discretized equations were solved stream function, vorticity, and energy equations by finite difference method using explicit technique and Successive Over- Relaxation method. The study was performed for different values of Rayleigh number ranging from 103 to 105 for different angle position of heated thin plate(0°, 45°, 90°). Air was chosen as a working fluid (Pr = 0.71). Aspect ratio of center of plate to the parallel left wall A2
... Show MoreA partial temporary immunity SIR epidemic model involv nonlinear treatment rate is proposed and studied. The basic reproduction number is determined. The local and global stability of all equilibria of the model are analyzed. The conditions for occurrence of local bifurcation in the proposed epidemic model are established. Finally, numerical simulation is used to confirm our obtained analytical results and specify the control set of parameters that affect the dynamics of the model.
Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreThe purpose of this study was to investigate the difference in mandibular trauma caused by two mechanisms for the delivery of missile injuries: firearms and improvised explosive devices (IEDs). The data investigated included sex, age, mechanism of injury, and other clinical and radiographic manifestations. Seventy consecutive patients, predominantly male, with a mean age of 28.6 ± 14 years (range 2–60 years) were enrolled: 38 patients (54.3%) sustained mandibular fractures caused by bullet injuries and 32 patients (45.7%) had mandibular fractures caused by IED explosion injuries. The study revealed that the differences in most of the investigated variables were not statistically significant; the only significant differences were the inci
... Show MoreThis study revolves around the rapid changes of science and a comparison of the formal and practical aspects and the reason behind summoning the changes and their types, which are subject to the influence of the recipient. This transformation represents formal and intellectual production cycles and formal functional generation that is subject to the goals of the system of multiple differences at the level of time and place. It meets the needs and the request for change, but access to it comes through multiple systems and portals that are different from the normal and the usual, so this study was called (meta and its dimensions in the designed biological formation (virtual reality environment - a model). The research seeks to find solutio
... Show More