Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
Objective To highlight the main demographic characteristics and clinical profiles of female patients registered with breast cancer in Iraq; focusing on the impact of age.Methods This retrospective study enrolled 1172 female patients who were diagnosed with breast cancer at the Main Center for Early Detection of Breast Cancer/Medical City Teaching Hospital in Baghdad. Data were extracted from an established information system, developed by the principal author under supervision of WHO, that was based on valid clinical records of Iraqi patients affected by breast cancer. The recorded information regarding clinical examination comprised positive palpable lumps, bloody nipple discharge, skin changes, bilateral breast involvement, tumor
... Show MoreIn this research, cyclic compounds derived from 2- furfural mercaptan (oxazole, triazoles) were synthesized, and their biological efficacy was measured and compared with standard drugs. Also, their effectiveness as anti-oxidant was measured and compared with ascorbic acid as a standard substance. Some of the synthesized compounds were deduced with good efficacy. © 2021 Sami Publishing Company. All rights reserved
The disruptions in supply chains have put small‐ and medium‐sized enterprises (SMEs) in dire need of resilient supply chains through which they can improve their performance. Based on the resource dependence theory, this study proposes a mediation model to improve the environmental performance (EP) of SMEs. The purpose of this study is to investigate the effect of supply chain resilience (SCR) on EP mediated by ambidextrous green innovation (AMGI). We proved a structural equation model based on questionnaire data from 261 companies in Iraq to test our hypotheses. The results show that SCR has a positive effect on AMGI for proactive and exploitative green innovation dimensions and positive impact on SMEs’ EP. AMGI plays a media
... Show MoreThis research focuses on the synthesis of carbon nanotube (CNT) and Poly(3-hexylthiophene) (P3HT) (pristine polymer) with Ag doped (CNT/ P3HT@Ag) nanocomposite thin films to be utilised in various practical applications. First, four samples of CNT solution and different ratios of the polymer (P3HT) [0.1, 0.3, 0.5, and 0.7 wt.%] are prepared to form thin layer of P3HT@CNT nanocomposites by dip-coating method of Ag. To investigate the absorption and conductivity properties for use in various practical applications, structure, morphology, optical, and photoluminescence properties of CNT/P3HT @Ag nanocomposite are systematically evaluated in this study. In this regard, the UV/Vis/NIR spectrophotometer in the wavelength range of 350 to 7
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreInfrastructure, especially wastewater projects, plays an important role in the life of residential communities. Due to the increasing population growth, there is also a significant increase in residential and commercial facilities. This research aims to develop two models for predicting the cost and time of wastewater projects according to independent variables affecting them. These variables have been determined through a questionnaire distributed to 20 projects under construction in Al-Kut City/ Wasit Governorate/Iraq. The researcher used artificial neural network technology to develop the models. The results showed that the coefficient of correlation R between actual and predicted values were 99.4% and 99 %, MAPE was
... Show MorePolyaniline membranes of aniline were produced using an electrochemical method in a cell consisting of two poles. The effect of the vaccination was observed on the color of membranes of polyaniline, where analysis as of blue to olive green paints. The sanction of PANI was done by FT-IR and Raman techniques. The crystallinity of the models was studied by X-ray diffraction technique. The different electronic transitions of the PANI were determined by UV-VIS spectroscopy. The electrical conductivity of the manufactured samples was measured by using the four-probe technique at room temperature. Morphological studies have been determined by Atomic force microscopy (AFM). The structural studies have been measured by (SEM).