Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
Research aims to identify the immediate impact of the announcement of mergers in the stockholders and the feasibility of gain abnormal return and benefiting from asymmetric information during the announcement that unite 30 days before the announcement of the merger, and announcement day, and 30 days after the announcement of the merger. It was the largest and most important mergers and acquisitions pick that occurred during the global financial crisis, specifically in health care/pharmaceutical industry, Pfizer and Wyeth merger with Novartis acquisition on Alcon. search has adopted three hypotheses: the first hypothesis that ((achieves the target company's shareholders positive abnormal return (or negative) during and befor
... Show MoreDue to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many application
... Show MoreSatire is genre of the literary arts that has always been the source of human interest. Because it is difficult to accept direct criticism, Satire appears as a literary tool in which vices, follies, abuses and shortcomings are held up to ridicule, with the intent of shaming individuals, corporations, government, or society itself into improvement. A satirical critic usually employs irony to attain this goal. Although satire is usually meant to be humorous, its greater purpose is often profitable social criticism, using wit to draw at
... Show MoreThe research aims to identify the extent to which Iraqi private banks practice profit management motivated by reducing the taxable base by increasing the provision for loan losses by relying on the LLP it model, which consists of a main independent variable (net profit before tax) and independent sub-variables (bank size, total debts to total equity, loans granted to total obligations) under the name of the variables governing the banking business. (Colmgrove-Smirnov) was used to test the normal distribution of data for all banks during the period 2017-2020, and then find the correlation between the main independent variable sub and the dependent variable by means of the correlation coefficient person, and then using the multiple
... Show MoreAbstract
The current research aims to identify the typical effect of Flower and Coscroft on expressive performance and the development of lateral thinking among literary fifth-grade students. To achieve the research objective, the researcher chose a sample of (90) female students from the fifth literary grade, with two experimental groups and a control group. The research groups are of six subjects. The research found that the two experimental groups have more expressive performance than the control group. Students of the first experimental group outperformed the students of the second experimental group in expressive performance and lateral thinking tests. In light of the findings of the research, the researcher
... Show Morethe Research problem entitled: (compound shapes in the work of the artist Max Ernst and Ali Najjar) the nature of the concept of compound shapes and mechanisms of functioning in contemporary art done. The research consisted of(4) four parts: the first part is dealing with the methodological framework of the Search represented the research problem , which is manifested through this study to reveal the technical features of the composite shapes, that linked achievement both artists (Max Ernst) and (Ali Al Najjar). Which is crystallized into two objectives as follows: 1 - Detection of the technical features of the composite shapes in the work of Max Ernst and Ali Al-Najjar.2 - Detection of similarities and differences in the recruitment of
... Show MoreThe study aimed to evaluate injuries and economic losses which caused by rose beetle Maladerainsanabilis (Brenske) on ornamental and fruit plants as introduced insect in Iraq during 2015 and determine infested host plants in addition to evaluate efficacy of pathogenic fungi Metarhiziumanisopiliae (1x10⁹ spore/ ml) and Beauvariabassiana (1x10⁸spore/ ml) in mortality of insect larvae in laboratory and field.The results showed that the insect was polyphagous infested many host plants (20 host plant)Which caused degradation and dead the plants through adult feeding on leaves and flower but large injury caused by larvae feeding on root plants which caused obligate dead to infested plant, the percentage mortality of rose plants 68.6%, pear
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreDespite all the possibilities, owned by Iraq for the production of fish, but there is low in the level of production and in the rate of per capita consumption is due to inter alia, the weakness of investment, stop government support, a significant decline in the quantities of water, the high proportion of salinity and the proportion of pollution in the water, the use of means and fishing methods are primitive, weak laws and legislation, the policy of dumping markets imported products. Despite all this research has shown that there are investment opportunities very large in this sector through the size of the market and the absorptive capacity and the growth of per capita income and cultural revelation