Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
The objective of this research is to know the extent to which Iraqi and Arab companies apply the criteria of accounting for sustainability and disclosure, as well as to analyze the content of the annual financial reports of the companies listed in the financial market to determine their compliance with the Sustainability Accounting Standards Board )SASB(. Annual Report The commitment of telecommunications companies to implement sustainability issues related to the standard of telecommunications services reached a general average of (54%) for the sample of the research sample. This means that there is a degree of admissibility in applying the standard. As well as the highest level of reporting to the criterion of the (Jordan Telec
... Show MoreThe COVID-19 pandemic has profoundly affected the healthcare sector and the productivity of medical staff and doctors. This study employs machine learning to analyze the post-COVID-19 impact on the productivity of medical staff and doctors across various specialties. A cross-sectional study was conducted on 960 participants from different specialties between June 1, 2022, and April 5, 2023. The study collected demographic data, including age, gender, and socioeconomic status, as well as information on participants' sleeping habits and any COVID-19 complications they experienced. The findings indicate a significant decline in the productivity of medical staff and doctors, with an average reduction of 23% during the post-COVID-19 period. T
... Show MoreIn this paper, a theoretical study of the energy spectra and the heat capacity of one electron quantum dot with Gaussian Confinement in an external magnetic field are presented. Using the exact diagonalization technique, the Hamiltonian of the Gaussian Quantum Dot (GQD) including the electron spin is solved. All the elements in the energy matrix are found in closed form. The eigenenergies of the electron were displayed as a function of magnetic field, Gaussian confinement potential depth and quantum dot size. Explanations to the behavior of the quantum dot heat capacity curve, as a function of external applied magnetic field and temperature, are presented.
Autism is a lifelong developmental deficit that affects how people perceive the world and interact with each others. An estimated one in more than 100 people has autism. Autism affects almost four times as many boys than girls. The commonly used tools for analyzing the dataset of autism are FMRI, EEG, and more recently "eye tracking". A preliminary study on eye tracking trajectories of patients studied, showed a rudimentary statistical analysis (principal component analysis) provides interesting results on the statistical parameters that are studied such as the time spent in a region of interest. Another study, involving tools from Euclidean geometry and non-Euclidean, the trajectory of eye patients also showed interesting results. In this
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreAbstract
Magnetic abrasive finishing (MAF) is one of the advanced finishing processes, which produces a high level of surface quality and is primarily controlled by a magnetic field. This paper study the effect of the magnetic abrasive finishing system on the material removal rate (MRR) and surface roughness (Ra) in terms of magnetic abrasive finishing system for eight of input parameters, and three levels according to Taguchi array (L27) and using the regression model to analysis the output (results). These parameters are the (Poles geometry angle, Gap between the two magnetic poles, Grain size powder, Doze of the ferromagnetic abrasive powder, DC current, Workpiece velocity, Magnetic poles velocity, and Finishi
... Show MoreCorrosion of steel reinforcement is one of the biggest problems facing all countries in the world like bridges in the beach area and marine constructions which lead to study these problems and apply some economical solutions. According to the high cost of repair for these constructions, were studied the effect of using kind of chemical compounds sodium nitrite(NaNO2) and sodium silicate(Na2SiO3) as corrosion inhibitors admixture for steel bars that immersed partially in electrolyte solution (water + sodium chloride in 3% conc.) (Approximately similar to the concentration of salt in sea water). The two inhibitors above added each one to the electrolyte solution at concentrations (0.5%, 1% and 2%) for both
... Show MoreIntroduction and Aims: Job burnout such as occupational hazards that have been considered in recent years. This research aimed to investigate the relationship between religious beliefs and job burnout among nurses working in hospitals in Gonabad city in 2017. Materials and Methods: This study is cross-sectional and correlational study. The sample consisted of 100 nurses in Gonabad city who were selected using stratified randomized method. Using the Maslach job burnout and Alport religious beliefs Inventories, data were collected and were analyzed with SPSS version 16 and Pearson, Spearman and independent sample T tests were analyzed. Significant level was considered less than 0.05. Results: Average job burnout in nurses working in hospit
... Show MoreThe members of the family of Eentrobacteriaceae harbour a gene cluster called polyketide synthase (pks) island. This cluster is responsible for the synthesis of the genotoxin colibactin that might have an important role in the induction of double-strand DNA breaks, leading to promote human colorectal cancer (CRC). Eleven out of the eighty eight isolates (12.5%) were pks+, distributed as 7 (8%) isolates of E. coli, 2 (2.25%) of K. pneumoniae and 2 (2.25%) of E. aerogenes. The cytotoxic effects of selected pks+ isolates (E. coli and E. aerogenes) on HeLa cells were represented by decreasing cell numbers and enlarged cell nuclei in comparison to the untreated cells. Cyt
... Show More