The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThere has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The printing designer's creative thinking is a deliberate mental process based on specific skills that stimulate the motivation of the student to learn and call for new information for the investigation and research to discover the problems and attitudes and through reformulating the experience in new patterns depending on the active imagination and the flexible scientific thinking through providing the largest number possible of various unfamiliar printing design models, and testing their suitability and then readjusting the results with the availability of suitable educational, learning and academic atmosphere.
The designer's creative thinking depends on main skills. Fluency skill is to put t
... Show MoreThe university Service employee is considered one of the categories of public employees, However, The academic and administrative tasks duties that undertakes have made him a special importance and a distinguished legal status, Therefore, we find That the Iraqi legislatures assigned this category a special Law, it is the university Service law No (23) of 2008 as amended who dealt with some aspects related to serving this category, such as duties, right, condition for appointment and award of academic titles, and financial allocation, such as university service allocation, academic title allocations, and some other Provisions leaving other matters to the general service laws and employee discipline, among the matters that the legislator negl
... Show MoreA field experiment was carried out in one of the orchards of Al-Qassim district in Babel Governorate to find out the ability of a locally manufactured platform to serve palm trees by working in flat and uneven orchard land, palm tree heights of 4, 8, and 12 meters, and it performs pollination, pruning and harvesting services. The time of ascent and descent, the palm service, and the palm/hour productivity were measured. A randomized complete block design with three replications used a split split-plot arrangement. The nature of the land (flat or uneven) represented the main plots, the height of the palm trees (4, 8, 12) meters, the sub-plots, and the palm service operations (pollinati
The principal concern of this study is Disjunct and Conjunct adverbials in the
English language. The study sets out to explore and clarify the types, nature and
structure of disjuncts and conjuncts. It also aims at testing student's performance to
evaluate the use and usage of the disjuncts and conjuncts in their written performance.
Two tests, accordingly, were given to some fifty students of at the Dept. of English, at
the college of languages (third and fourth stages) in the University of Sulaimani. The
hypothesis that the study was based on are those students use disjuncts and conjuncts
hardly enough in their writings and when doing so, they generally tend to stick only to
the most commonly used and familiar o