Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
This study aims to simulate and assess the hydraulic characteristics and residual chlorine in the water supply network of a selected area in Al-Najaf City using WaterGEMS software. Field and laboratory work were conducted to measure the pressure heads and velocities, and water was sampled from different sites in the network and then tested to estimate chlorine residual. Records and field measurements were utilized to validate WaterGEMS software. Good agreement was obtained between the observed and predicted values of pressure with RMSE range between 0.09–0.17 and 0.08–0.09 for chlorine residual. The results of the analysis of water distribution systems (WDS) during maximum demand
The Mishrif reservoir (Cenomanian - Turonian) in the Z, H, B and N oilfields in southern Iraq was investigated to clarify how nickel, vanadium, asphaltene, NSO and sulfur content affect the crude oil quality. The GC-Mass and ICP-MS analyses were used to provide fruitful hydrocarbon results. Classification of crude oil based on API gravity broadly indicates the oil's density and general properties. Typically, lighter crude oils are easier to refine, yield higher percentages of valuable products such as gasoline and diesel, and have a higher market value. Heavier crude oils require more processing and may yield more residual products, such as heavy fuel oil and asphalt. The Mishrif crude oil was classified as a medium sour crude oil c
... Show MoreThe increasing demand for energy has encouraged the development of renewable resources and environmentally benign fuel such as biodiesel. In this study, ethyl fatty esters (EFEs), a major component of biodiesel fuel, were synthesized from soybean oil using sodium ethoxide as a catalyst. By-products were glycerol and difatty acyl urea (DFAU), which has biological characteristics, as antibiotics and antifungal medications. Both EFEs and DFAU have been characterized using Fourier transform infrared (FTIR) spectroscopy, and 1H nuclear magnetic resonance (NMR) technique. The optimum conditions were studied as a function of reaction time, reactant molar ratios, catalyst percentage and the effect of organic solvents. The conversion ratio of soybea
... Show MoreBackground: Chemotherapeutic medication treatment for cancer is typically used in conjunction with other techniques as part of a routine regimen. It is well established that the capacity of different chemotherapeutic drugs to induce apoptosis is correlated with their anticancer efficacy. Quinazolinone-based drugs have demonstrated excellent responses from several cancer cell types. These substances have a lot of potential for use as building blocks in the creation of apoptosis inducers. Objective: To assess the new quinazolinone derivatives (M1 and M2) that were recently synthesized for their potential to halt wound healing and to use the acridine orange/propidium iodide (AO/PI) double stain to assess their capacity to induce apopto
... Show MoreMorus alba, member of the Moraceae family, is a perennial tree utilized in folk medicine, preparing the modern drug, and considered the main food for silkworms. However, data on chemical content in the leaves is still limited; the main objective of this study is to detect the presence and determine the concentration of different polyphenolic constituents in the leaves of the Morus alba plant by reverse phase-high performance liquid chromatography (RP-HPLC) and evaluate the cytotoxic effect of ethyl acetate extract of this plant on human breast cancer (AMJ-13) cell line. Phytochemical analysis of the Morus alba leaves ethyl acetate extract led to identifying and quantification of six polyphenolic constituents designated as phenolic a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More