Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
The mechanical properties and microstructure of hot-rolled steel are critical in determining its performance in industrial applications, particularly when exposed to elevated temperatures. This study examines the effects of varying temperatures and soaking times on these properties through a series of controlled experiments. The primary objective was to optimize the key response parameters, including tensile strength, yield strength, and elongation, by analyzing the influence of temperature and time. A full factorial design approach was used, applying the desirability function theory to explore all possible combinations and identify optimal processing conditions. The experimental results showed that the soaking time played a critica
... Show MoreEriobotrya japonica Lindl., named as loquat, is a subtropical fruit tree of the family Rosaceae which is well known medical plant originated in Japan and China. Loquat portions, like leaves, peels and fruits have been shown to possess various health usefulnesses. In Chinese classical medicine, it is vastly utilized in many illnesses, like gastroenteric disorders, diabetes mellitus, pulmonary inflammatory diseases and chronic bronchitis. Loquat plant contain many active constituents, such as flavonoids, carotenoids, vitamins, polyphenolic compounds, other that have many biological effects like anti-tumor, anti-diabetic, anti-inflammatory, anti-mutagenic, antioxidant, antiviral, antitussive, hepatoprotective and hypoli
... Show MoreBackground. Alopecia areata (AA) is a common form of noncicatricial hair loss of unknown cause, affecting 0.1-0.2% of the general population. Most evidence supports the hypothesis that it is disease of the hair follicle of autoimmune nature mediated by T-cells, with important cytokine role. Objective of the Study. The objective of this study is to study the association and changes in serum levels of interleukin-15 (IL-15) and tumor necrosis factor-α (TNF-α) in patients with AA in relation to the type, activity, and disease duration. Patients and Methods. Thirty-eight patients with AA and 22 individuals without the disease as controls were enrolled in this case-controlled study conducted in the Department of Dermatology in the Al-K
... Show MoreThe disruptions in supply chains have put small‐ and medium‐sized enterprises (SMEs) in dire need of resilient supply chains through which they can improve their performance. Based on the resource dependence theory, this study proposes a mediation model to improve the environmental performance (EP) of SMEs. The purpose of this study is to investigate the effect of supply chain resilience (SCR) on EP mediated by ambidextrous green innovation (AMGI). We proved a structural equation model based on questionnaire data from 261 companies in Iraq to test our hypotheses. The results show that SCR has a positive effect on AMGI for proactive and exploitative green innovation dimensions and positive impact on SMEs’ EP. AMGI plays a media
... Show MoreThe Back-Propagation (BP) is the best known and widely used learning algorithm in training multiple neural network. A vast variety of improvements to BP algorithm have been proposed since ninety’s. in this paper, the effects of changing the number of hidden neurons and activation equation are investigated. According to the simulation results, the convergence speed have been improved and become much faster by the previous two modifications on the BP algorithm.
To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreAbstract\
preparation process of performance evaluation in organizations is of extreme importance, and under development in organizations and the opening of markets and technological developments in the industry and heightened competition among industrial organizations imposed systems are built for performance give a clear picture about performance and competition, And centered research problem in answering the following questions: Is performance evaluation system is available in Wasit State Company for Textile Industries(Research sample ), This research aims to assess the performance of policies and programs in the company, according to guide performance evaluation of programs and policies prepared by the Dutch Cou
... Show More