Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space) position of in the cover text that used to hide the the secrete sender masseges. The experiments results show that the suggested method presents highly secret due to use the multi-level of complexity to avoid the attackers.
The education sector suffers from many problems, including the scarcity of schools that can absorb the increasing number of students in light of the increasing population growth rate, as some regions suffer from a lack of opening of new schools or the expansion of existing schools to increase their capacity so that attention is required. The research sought to identify the level of maturity of project management at the research site (Building Department in Al-Karkh I/ Ministry of Education) Being responsible for educational projects and their implementation and to know that, the ten areas of the knowledge guide to project management PMBOK have been adopted according to the PM3 model (one of the models of maturity
... Show MoreThe introduction of Industry 4.0, to improve Internet of Things (IoT) standards, has sparked the creation of 5G, or highly sophisticated wireless networks. There are several barriers standing in the way of 5G green communication systems satisfying the expectations for faster networks, more user capacity, lower resource consumption, and cost‐effectiveness. 5G standards implementation would speed up data transmission and increase the reliability of connected devices for Industry 4.0 applications. The demand for intelligent healthcare systems has increased globally as a result of the introduction of the novel COVID‐19. Designing 5G communication systems presents research problems such as optimizing
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
In this study, the aqueous extract of (Typha domingensis Pers.) pollen grain (qurraid) to know its ability to manufacture silver nanoparticles. Qurraid is a semi-solid yellow food substance, sold in Basra markets and eaten by the local population. It is made from the pollen of the T. domingensis Pers. plant after being pressed and treated with water vapor. The Gas chromatography–mass spectrometry (GC-MS) reaction was done to identify the active compounds of qurraid aqueous extract. The ability of the aqueous extract of qurraid to manufacture silver nanoparticles was tested, and the construction of silver nanoparticles was inferred by the reaction mixture's color, which ranged from yellow to dark brown. The synthesi
... Show MoreAcinetobacter baumannii (A. baumannii ) is considered a critical healthcare problem for patients in intensive care units due to its high ability to be multidrug-resistant to most commercially available antibiotics. The aim of this study is to develop a colorimetric assay to quantitatively detect the target DNA of A. baumannii based on unmodified gold nanoparticles (AuNPs) from different clinical samples (burns, surgical wounds, sputum, blood and urine). A total of thirty-six A. baumannii clinical isolates were collected from five Iraqi hospitals in Erbil and Mosul provinces within the period from September 2020 to January 2021. Bacterial isolation and biochemical identification of isolates
... Show MoreSurvival analysis is widely applied in data describing for the life time of item until the occurrence of an event of interest such as death or another event of understudy . The purpose of this paper is to use the dynamic approach in the deep learning neural network method, where in this method a dynamic neural network that suits the nature of discrete survival data and time varying effect. This neural network is based on the Levenberg-Marquardt (L-M) algorithm in training, and the method is called Proposed Dynamic Artificial Neural Network (PDANN). Then a comparison was made with another method that depends entirely on the Bayes methodology is called Maximum A Posterior (MAP) method. This method was carried out using numerical algorithms re
... Show MoreIn this study, Zizphus spina-christi leaf powder was applied for the adsorption of methyl orange. The effect of different operating parameters on the Batch Process adsorption was investigated such as solution pH (2-12), effect of contact time (0-60 min.), initial dye concentration (2-20 mg/L), effect of adsorbent dosage (0-4.5 g) and effect of temperature (20-50ᵒC). The results show a maximum removal rate and adsorption capacity (%R= 23.146, qe = 2.778 mg/g) at pH = 2 and equilibrium was reached at 40 min. The pseudo- second-order kinetics were found to be best fit for the removal process (R2 = 0.997). Different isotherm models (Langmuir, Freundlich, Dubini-Radushkevich,Temkin) were applied in this stud
... Show More