Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
The effect of 410nm with 100 mW output power and one centimetre spot size (0.128 W/cm2 power density) Diode laser irradiation at different exposure times on the growth of Gram-negative Pseudomonas aeruginosa and Gram-positive Staphylococcus aureus was evaluated. Seventy swap samples were collected from burn and infected wounds of 35 patients admitted to the burn-wound unit in Al-Yarmouk Teaching Hospital in Baghdad during the period from December 2014 to February 2015. These bacteria were isolated and identified depending on their growth on selective media, cultural characteristics, Gram stain morphology and biochemical tests and finally were confirmed by Vitek 2 compact system test .Susceptibility of bacterial isolates to 15antibiotics
... Show MoreIn the present work, the surface properties of mixed binary surfactants containing sodium dodecylbenzene sulfate (SDBS) and Tween 80 (TW80) surfactants in aqueous solutions were studied at temperature 293 K using surface tension measurements. The critical micelle concentration (cmc) magnitude for both individual surfactants and their mixtures were established the obtained results revealed that the magnitude of cmc of the mixtures are less than the magnitude of individual surfactants and decrease with the increase in Tween 80 percent in solution which indicate the nonideal mixing of the two surfactants. The values of molecular interaction parameters and the mole fraction of surfactants in the micelle (X1) were calculated
... Show MoreAllowing Iraqi companies to use multiple systems and policies leads to varying levels of disclosure and no high symmetry between report preparers and users, and that the adoption of integrated reporting can reduce information asymmetry. The theoretical side addressed the concepts of these variables, and in the practical side the binary variable (0, 1) was used. To compensate for the value of the independent variable (integrated reporting) based on the Central Bank of Iraq’s classification of banks according to the (CAMLES) index, and the dependent variable (information asymmetry) was measured through two measures (price difference, unusual return), the research community was represented by (5) Banks out of the total of banks li
... Show More
The aim of the research is to identify the effect of instructional design according to Kagan structure among the first intermediate school student’s, and how skills could help in generating information in mathematics. In accordance with the research objectives, the researcher has followed the experimental research method by adopting an experimental design with two equivalent groups of post-test to measure skills in generating information. Accordingly, the researcher raised two main null hypotheses: there were no statistically significant differences at the level of significance (0.05) between the average scores of the experimental group who studied the material according to Kagan structure and th
... Show MoreAbstract
Purpose: The research attempts to Stand on the reality of the effective application of of strategic information systems in telecommunications companies in the Kurdistan Region, and what is the amount of the impact of such systems on promoting of Strategic Intelligence.
Design/Methodology/Approach: The Applied method has been used, In order to achieve the objectives of the research has been the development of a questionnaire prepared for this purpose and then distributed to (11) Company of Iraqi communications operating in Kurdistan Region companies, it has been used questionnaire to collect data in order to develop
... Show MoreInformation Technology has become one of the Most Prominent tools in the Era of Technology and Telecommunication of our Digital World. For that Reasons most Organizations had taken the tools Adapted to their Present and Future Directions and for the Improvement for it's Operations and Workability in Internal or External Enviroment. Consequently the Points of Strength Beats the Weakness and as Result of Increase Opportunities and Decrease the Threats Facing these Organizations. This Search has been made to test the Existence or not Existence role of the Information Network Technologies that Include {Internet and Extranet} in Application of Information Technology t
... Show MoreThe mysterious letters, the philosophy of existence and the meaning of these letters in the Qur'an is one of the mysterious issues that has always occupied the minds of Interpreters. Each Interpreter has tried to provide his own interpretation and understanding of these mysterious letters. Since these letters are part of the surah of the Qur'an and at the same time, the appearance of these letters, unlike other verses, does not indicate meaning, the commentators have approached these verses with their preconceptions. In this article, an attempt has been made to investigate the role of pre-interpreters of descriptors in a descriptive and analytical method in finding the meaning of syllables. However, each of them has tried to interpret th
... Show MoreIn this paper, the productions of gallium oxide (Ga2O3) nanoparticles were achieved via using the Nd: YAG laser deposition method with a fundamental wavelength (1064 nm). These nanoparticles were characterized by using different methods such as X-ray diffractometer (XRD), atomic force microscopy (AFM) and Ultraviolet–visible (UV–vis) spectroscopy. To examine the effects of laser energy on the properties of nanoparticles, the experimental results and theoretical considerations were prepared by the effective method of pulse laser deposition. The synthesis of Ga2O3NPs) was achieved with different ranges of energies (500 to 900 mJ). Average crystallite sizes of the synthesized nanopar
... Show MoreCryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o
... Show MoreIn this study, we investigate about the run length properties of cumulative sum (Cusum) and The exponentially weighted moving average (EWMA) control charts, to detect positive shifts in the mean of the process for the poisson distribution with unknown mean. We used markov chain approach to compute the average and the standard deviation for run length for Cusum and EWMA control charts, when the variable under control follows poisson distribution. Also, we used the Cusum and the EWMA control charts for monitoring a process mean when the observations (products are selected from Al_Mamun Factory ) are identically and independently distributed (iid) from poisson distribution i
... Show More