Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
The present study aims to investigate the seroprevalence rate of Toxoplasma gondii infection and its relation to some demographic factors among males in Duhok province/Iraq. A total of 424 random blood samples were collected from the male population of different ages (18-60) years and different social-economic classes. Out of 424 samples examined, 108 (25.47%) were seropositive to the anti- T. gondii antibodies; 88 (20.75%) were found seropositive for IgG, while 20 (4.72%) samples were seropositive for IgM. Regarding occupation, the highest percentage for chronic toxoplasmosis was reported in workers followed by policemen and pensioners at rates of 23.96%, 23.6%, and 23.07%, respectively. The age group 18-30 y
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe current study deals with the performance of constructed wetland (CW) incorporating a microbial fuel cell (MFC) for wastewater treatment and electricity generation. The whole unit is referred to as CW-MFC. This technique involves two treatments; the first is an aerobic treatment which occurs in the upper layer of the system (cathode section) and the second is anaerobic biological treatment in the lower layer of the system (anode section). Two types of electrode material were tested; stainless steel and graphite. Three configurations for electrodes arrangement CW-MFC were used. In the first unit of CW-MFC, the anode was graphite plate (GPa) and cathode was also graphite plate (GPc), in the second CW-MFC unit, the anode was stainless st
... Show MoreAbstract
The study presents a mathematical model with a disaggregating approach to the problem of production planning of a fida Company; which belongs to the ministry of Industry. The study considers disaggregating the entire production into 3 productive families of (hydraulic cylinders, Aldblatt (dampers), connections hydraulics with each holds similar characteristics in terms of the installation cost, production time and stock cost. The Consequences are an ultimate use of the available production capacity as well as meeting the requirements of these families at a minimal cost using linear programming. Moreover, the study considers developing a Master production schedule that drives detailed material and production requi
... Show Morecompound [1] was formed from the reaction of benzoin and benzaldehyde in the presence of ammonia, which was reacted with sodium hydride in DMF to obtain imidazole salt. This salt was reacted with adipoyl chloride to give compound [2]. Acid hydrazide derivative [3] was obtained from the reaction of compound [2] with hydrazine hydrate. After that Shiff bases [4-9] have been synthesized from the reaction of compound [3] with different aromatic aldehydes. These new formed compounds were diagnosed by 13C-NMR, 1H-NMR for some of them (in Ahl-Albate University in Jordan) and FT-IR spectroscopy (In Baghdad University). All of the prepared products have been studied their biological activities toward two kinds of bacteria. These products show
... Show MoreBased on previous research results that recognized the role of paternalistic leadership in promoting a positive work climate, this study explored the impact of a toxic work environment on the mental health and well-being of employees. We used the quantitative methodology to collect and analyze data. A sample of 108 participants from Iraqi internet service provider (ISPs) companies represented the purposive study sample. We targeted employees who experienced the COVID-19 pandemic. All data was collected through an electronic questionnaire (Google and Microsoft Forms). The research model was tested using structural equation modeling (SEM). The results showed a negative effect of the toxic workplace on the mental health of employees. T
... Show MoreIn the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show More