A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
The production companies in the Iraqi industry environment facing many of the problems related to the management of inventory and control In particular in determining the quantities inventory that should be hold it. Because these companies adoption on personal experience and some simple mathematical methods which lead to the identification of inappropriate quantities of inventory.
This research aims to identify the economic quantity of production and purchase for the Pepsi can 330ml and essential components in Baghdad soft drinks Company in an environment dominated by cases of non ensure and High fluctuating as a result of fluctuating demand volumes and costs ass
... Show MoreIn recent decades, global obesity has increased significantly, causing a major health problem with associated complications and major socioeconomic issues. The central nervous system (CNS), particularly the hypothalamus, regulates food intake through sensing the metabolic signals of peripheral organs and modulating feeding behaviors. The hypothalamus interacts with other brain regions such as the brain stem to perform these vital functions. The gut plays a crucial role in controlling food consumption and energy homeostasis. The gut releases orexigenic and anorexigenic hormones that interact directly with the CNS or indirectly through vagal afferent neurons. Gastrointestinal peptides (GIP) including cholecystokinin, peptide YY, Nesf
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreSingle Walled Carbon nanotubes (SWCNTs), as nano-needle structures, are good candidates as nanocarrier delivery systems that carry drug to the site of action. They are good due to their unique pharmaceutical properties. Teniposide is an anticancer drug, which is widely used, but it has a problem of low solubility. In this study, to improve the properties of carbon nanotubes, pre-functionalization of carbon nanotubes via carboxylation with strong acids has been performed and then functionalized through attaching them to the polymer and copolymer. Concurrently, a proper polymer-copolymer combination has been selected by the UV-Visible spectrometer at 880nm. It is selected based on the qualitative dispersibility analysis, the visual observa
... Show MoreTumours in pets occur naturally and are common in dogs as they are in humans. Tumours of the alimentary system have been reported in animals, although less frequently. Food patterns and specific diet components could have a big role in such tumour occurrence. Therefore, the aim of this study was to investigate the clinical signs and inspect the neoplasm lesions of the gastrointestinal (GI) tract grossly and histopathologically in dogs in Baghdad, Iraq, and to see whether pet diets had any tumourigenic effect. Throughout two years sixteen dogs were referred to Teaching Animal Hospital and private clinics at Baghdad city with masses in (GI) tract. Males and large size breeds were more likely to be affected with GI tumours. Half of the cases a
... Show MoreThis paper deals with the description of the system of formation and derivation of words in the Russian language. In this work, we will present recent trends in the study of the Russian language that deal with vocabulary formation. The lexical system of the Russian language is associated with a common (or opposite) meaning; similar (or opposite) in stylistic characteristics; united by a common type of word formation; related to a common descent and belonging to a vocabulary of much or little use, etc. The results of the most prominent linguists and specialists who dealt with this topic will be presented, in addition to presenting their different views on word formation. The words of the Russian language consist of mor vimat that participate
... Show MoreThis paper presents the dynamic responses of generators in a multi-machine power system. The fundamental swing equations for a multi-machine stability analysis are revisited. The swing equations are solved to investigate the influence of a three-phase fault on the network largest load bus. The Nigerian 330kV transmission network was used as a test case for the study. The time domain simulation approach was explored to determine if the system could withstand a 3-phase fault. The stability of the transmission network is estimated considering the dynamic behaviour of the system under various contingency conditions. This study identifies Egbin, Benin, Olorunsogo, Akangba, Sakete, Omotosho and Oshogbo as the key buses w
... Show MoreThis paper introduces a relationship between the independence of polynomials associated with the links of the network, and the Jacobian determinant of these polynomials. Also, it presents a way to simplify a given communication network through an algorithm that splits the network into subnets and reintegrates them into a network that is a general representation or model of the studied network. This model is also represented through a combination of polynomial equations and uses Groebner bases to reach a new simplified network equivalent to the given network, which may make studying the ability to solve the problem of network coding less expensive and much easier.
A Monte Carlo simulation has been used to design program which simulate gamma rays backscattering system. Gamma ray backscattering is very important to get useful information about shielding, absorption and counting problems. Simulation was done of a 661.6 KeV from a collimated point source of 137Cs. When increasing the scattering angle of photon which emerging from Iron target , as the incident gamma beam angles of 15°, 45° and 75°, the results showed that the single scattering count decreases. Whereas, this count increased by increasing the incident angle. In addition, the single scattering peak (count) increases according to the sample thickness until „saturation thickness‟. Our simulation results are useful to evaluate the opt
... Show MoreSufficient conditions for boundary controllability of nonlinear system in quasi-Banach spaces are established. The results are obtained by using the strongly continuous semigroup theory and some techniques of nonlinear functional analysis, such as, fixed point theorem and quasi-Banach contraction principle theorem. Moreover, we given an example which is provided to illustrate the theory.