Let R be a 2-torision free prime ring and ?, ?? Aut(R). Furthermore, G: R×R?R is a symmetric generalized (?, ?)-Biderivation associated with a nonzero (?, ?)-Biderivation D. In this paper some certain identities are presented satisfying by the traces of G and D on an ideal of R which forces R to be commutative
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreThis research aims to know the impact of leadership integrity as explanatory variable including its dimensions (courage, asceticism, justice, rationality, and humanity) on organizational conflict as responding variable. This research depended on the descriptive-constructive approach through the responses of a sample of (79) employees from (Real Estate Office of The State) in Al-Najaf province. The analyzing of the study done by using (Smart PLS) program to calculate (R2, t, p). Many results have been concluded and one of them, there is significant impact correlation of the leadership integrity on organizational conflict. There are many suggestions have been reached depending on the results reached and one of them is the necess
... Show MoreTaxes are an essential axis in the economy as the most effective and effective economic tool in any country (economy). Expanding the scope of taxation without adequate study has produced a dangerous result with a negative impact that is almost apparent, namely (tax evasion), which stands as a barrier preventing the state from reaching Therefore, the research sought to study strategic tax planning and its importance in reducing tax evasion, and the research aims from that to prove the importance of adopting strategic planning in the field of taxes according to modern and effective scientific foundations to reduce tax evasion to enhance the achievement of tax evasion. The financing objective is in addition to the other objectives,
... Show MoreThis study aimed to explore the manufacture of high-fat pellets for obesity induction diets in male Wistar rats and determined its effect on lipid profiles and body mass index. It was an experimental laboratory method with a post-test randomized control group. Formulation of high-fat pellets (HFD) and physico-chemical characteristics of pellets were conducted in September 2019. This study used about 28 male Wistar white rats, two months old, and 150-200 g body weight. Rats were acclimatized for seven days, then divided into four groups: 7 rats were given a standard feed of Confeed PARS CP594 (P0), and three groups (P1, P2, P3) were given high-fat feed (HFD FII) 30 g/head/day. The result showed that the mean fat content of Formula II pell
... Show MoreThis research aims to assess the adoption of TQM in the Middle East Bank for Investment, and diagnosis means and techniques of technological innovation that applied in, as well as to determine the nature of the relationship between total quality management practices (operations management, employment relations, customer relations) and technological innovation (the incremental innovation of the service, incremental innovation process, a radical innovation of the service, a radical innovation of the operation), through use the checklists, derived from a study (Kim et al, 2012) the many styles of mathematical and statistical tools was adopted like the percentage, mean, duplicates, as well as the adoption of the Z test th
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More