A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. The approach has been employed to use Fuzzy C-Mean clustering (FCM) to find the robust image regions for hiding the type of skin texture features in mice. The steganography was implemented using Least Significant Bit (LSB) method.
Herpes simplex virus (HSV) is a common human pathogen that causes severe infections in newborns and immunocompromised patients. Conjunctivitis or corneal epithelial keratitis is caused by HSV type 1 all over the world and at all times of the year. The present study was aimed at detecting HSV in patients suffering from conjunctivitis. One hundred and ten (110) clinical samples (90 patients and 20 controls, both males and females) of eye conjunctiva swabs were collected from patients of different ages. The samples were analyzed using qPCR and ELISA techniques. The qPCR results revealed that HSV was present in 47 (52.2%) of the 90 patients who were infected. Of these patients, 25 (48.0%) were males and 22 (57.8%) were females, indicati
... Show MoreThe study aims to build a proposed training program for school leaders in the Sultanate of Oman on the planning practices of the Kaufman model in light of the needs and challenges of reality. It also aims to identify the challenges facing school leaders in practicing the stages of strategic planning. To achieve these objectives, the study adopted the descriptive approach due to its suitability to the nature of the study. A questionnaire was used to collect the needed data. The study sample included (225) individuals from school principals, their assistants and senior teachers in post-basic education in the Sultanate of Oman. After processing the data statistically, the study concluded that the reality of planning practices for school lea
... Show MoreThis research includes a study of dezincification by corrosion from brass alloys in three types of media, which are acidic solution, basic and slat solution in different percentages. The study show the higher dezincification occurs in basic solution which decrease the fatigue properties where the fatigue properties are inversely proportional with dezincification.
The research aims to identify the theoretical foundations for measuring and analyzing quality costs and continuous improvement, as well as measuring and analyzing quality costs for the Directorate of Electricity Supply / Middle Euphrates and continuous improvement of the distribution of electrical energy,The problem was represented by the high costs of failure and waste in electrical energy result to the excesses on the network and the missing (lost) energy,Thus, measuring and analyzing quality costs for the distribution of electrical energy and identifying continuous improvement leads to a reduction in missing and an increase in sales, as the research reached many conclusions, the most important of which is the high percentage o
... Show MoreLafutidine (LAF) a newly developed histamine H2-receptor antagonist with absorption window makes it a good candidate to be prepared as floating drug delivery system. The current study involves formulation and in- Vitro evaluation of lafutidine as floating microspheres. Different formulation variables that affect the physicochemical properties of the prepared microspheres besides to the drug release behavior were investigated. Fourteen formulas were prepared by emulsion (o/w) solvent evaporation method using Ethyl cellulose (EC) as the polymeric matrix and tween 80 (TW80) as an emulsifying agent. The prepared formulas were evaluated for their percentage buoyancy (%), Percentage yield (%) and Entrapment efficiency (EE %). The results obt
... Show More
The objective of this study is to measure the impact of financial development on economic growth in Iraq over the period (2004-2018) by applying a fully corrected square model (FMOLS) Whereas, a set of variables represented by (credit-to-private ratio of GDP, the ratio of money supply in the broad sense of GDP, percentage of bank deposits from GDP) were chosen as indicators for measuring financial development and GDP to measure economic growth.
Major tests have been carried out, such as the stability test (Unite Root Test), the integration test (Cointegration). Results of the study showed that there
... Show MoreThe aim of this research is to introduce agricultural insurance, to define financing in the form of salam and the role of agricultural insurance in the prevention of risks to agricultural finance operations in the form of salam by verifying the hypotheses through which to reach the results, including the imposition of risks for agricultural finance in the form of salam, The study of agricultural finance in the form of salm, the deductive approach to the development of the problem of research and hypotheses, and the inductive method to extrapolate the results through analysis and brother The researcher concluded that agricultural insurance works to bridge the risks facing agricultural finance in the form of the ladder in cases of
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More