In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a cover that is digital color image for hiding a text in that selected cover for testing a proposed method of generating the private key. The hiding algorithm used is least significant bit (LSB). Finally, the generated key is tested by hiding process and changing the extension of image, after that notice the generated key is not changed or modified. the Matlap language is used to design and implement a proposed method.
Emotional blackmail is generally defined as manipulating others' emotions for personal gain. It is a type of manipulation that damages healthy relationships among people and turns them into toxic relations leaving the victim in a state of depression and under stress of losing something s/he holds dear. This study aims to identify the pragmatic techniques of emotional blackmail used by both blackmailers and victims in "No One Would Tell" (2018). To do so, the researchers developed an eclectic model comprising Forward and Frazier's (1997) emotional blackmail, Searle’s speech acts (1979), Brown and Levinson’s politeness strategies (1987), Culpeper’s impoliteness strategies (1996, 2005), and Mayfield's taxonomy of fallacy (2007)
... Show MoreVerbal Antonyms: A research in the relationship in meaning Between the words in Arabic language
APDBN Rashid, Southern African Linguistics and Applied Language Studies, 2023
The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola
... Show MoreThis research deals with number of novels for Marguerit Doras , specially A Bridge Towards Basfic and The Lover . we specialize the first chapter for discussing a very important issue , which is the Maraguerit Doras novelist world in another word the most important themes . that we discuss and through that we tried to clerify the privacy the characters of Marguerit Doras in comparative with her own generation and in the second chapter we discussed the most important characteristics of the romantic hero spedially the characteristics of women in her novels.
Change the morphological characteristics with the change of the factors affecting it has been shown that the Tigris River has the characteristics of the morphology of the low values in terms of depth, width and perimeter wet and gradient which in turn affected the morphological and other characteristics in terms of the direction and pattern of runoff came through the study of 48 cross-section is taken of the Tigris River Year 2008 by section for each 1 km, it has been shown that the average width of the Tigris River does not exceed 221.1 meters and the average depth of 3.9 meters either wet ocean amounted to 268.9 meters and changed the cross-section area of the last section at a rate of 4594.3 square meters, and through the study turned
... Show MoreThe article describes a certain computation method of -arcs to construct the number of distinct -arcs in for . In this method, a new approach employed to compute the number of -arcs and the number of distinct arcs respectively. This approach is based on choosing the number of inequivalent classes } of -secant distributions that is the number of 4-secant, 3-secant, 2-secant, 1-secant and 0-secant in each process. The maximum size of -arc that has been constructed by this method is . The new method is a new tool to deal with the programming difficulties that sometimes may lead to programming problems represented by the increasing number of arcs. It is essential to reduce the established number of -arcs in each cons
... Show MoreBackground: Obesity is becoming the healthcare epidemic world wide.Obesity is associated with reduced life expectancy, increased morbidity and mortality, and greater healthcare costs.Bariatric surgery is the only effective treatment for morbid obesity and is gaining increasing popularity. There has been a steady rise in the numbers and types of bariatric operations done worldwide in recent years butnon of prove to be ideal .Animal studies and use of animal models are significant element in the evolution of medical knowledge and the use of animals as a model for bariatric surgery is of importance to study the mechanisms of these operationsa and also help to develop new technique in management of obesity.Objectives:Study of effects of slee
... Show MoreThe study aims to reach a common point that achieves a balance between two interests, which are generally in conflict with the public interest and the interest of the individual owner of private property, by extrapolating the provisions of the constitutional judiciary that include the protection of private property, and this protection extends to every right of financial value and is not limited to a specific type, but It included everything that can be estimated with money, as ownership is no longer an advantage for the owner, but rather has become a right for him and a social function. The tax is imposed on what is derived from it, but if there is a need to prejudice it, the conditions, limits and restrictions expressly stipulated in the
... Show More