Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
The interest in the issue of capital movement as an economic phenomenon has increased because of its effects and effects and its ability to influence the economic balance and the effectiveness of monetary policy. All countries seek to attract capital and benefit from it because of its effects and results such as supporting economic development process and optimal allocation of economic resources. The problem of the financing gap that most countries suffer from, and others, but sometimes the movement of capital creates challenges for monetary policy makers in achieving their goals.
After 2003, the Iraqi economy witnessed an openness and economic liberalization unlike previous years, which
... Show MoreTo identify the fungi associated with water hyacinth (Eichhornia crassipes [Mart.] Solms), an aquatic weed, which presents in Tigris river from Baghdad south ward. Five regions from middle and south of Iraq (Al-Noumanya, Saeid Bin-Jubier, Al-Azizia, Al-Reyfay and Al-Hay) were selected for this study. Twelve fungal species were isolated. Alternaria alternata, Acremonium sp and Cladsporium herbarum, were the most frequently species (91.66 % ,50 % and 25 %) respectively. The fungi Alternaria alternata, Acremonium sp. and Phoma eupyrena were more aggressive to water hyacinth as (91.66%,83,33%, and 75%) in pathogenicity test.
Abstract
The research aims at the relationship between Servant leadership dimensions test as an independent variable and an organizational trust as a variable dependent. Thus it was necessary to answer the following question: Is there a correlation relationship and impact between Servant leadership dimensions and organizational trust? To investigate the contents of the answer, the researcher selected a group of employees in Oil Products Distribution Company / Baghdad. The researcher adopted the analytical descriptive approach in completing his research which dealt with a random sample of (190) individuals representing the research society out of the total number of (376) person from the middle and high Leaders. Depending
... Show MoreThe current research aims to analyze the extent of the adoption of the standards of ISO 45001: 2018 for occupational safety and health management by the General Establishment of Civil Aviation. The research problem was the extent to which the General Establishment of Civil Aviation approved ISO 45001: 2018 for occupational safety and health management. The questionnaire was used as a primary data collection tool, the sample was distributed (50) form, they were selected from the category of employees of the establishment at different levels to represent the research community. Data were analyzed using the statistical package (SPSS), a number of vector statistical methods were used as well as arithmetic mean, standard deviation, an
... Show MoreThe easternmost extent of the Pharaoh Eagle Owl Bubo ascalaphus (Savigny, 1809)
distribution has remained enigmatic due to id entification problems and lack of owl research.
In Iraq, B. ascalaphus has been reported from only few localities in western Iraqi deserts;
while its occurrence in Iran has not been reported before this study. In 2017 2020, several
new records of B. ascala phus in western through southeastern Iraq were made and a new
distribution range in western Iran was confirmed. Furthermore, field identification,
interspecific relationships and conservation status of B. ascalaphus in Iraq and Iran were
comprehensively di scussed.
Waveform flow of non-Newtonian fluid through a porous medium of the non-symmetric sloping canal under the effect of rotation and magnetic force, which has applied by the inclined way, have studied analytically and computed numerically. Slip boundary conditions on velocity distribution and stream function are used. We have taken the influence of heat and mass transfer in the consideration in our study. We carried out the mathematical model by using the presumption of low Reynolds number and small wave number. The resulting equations of motion, which are representing by the velocity profile and stream function distribution, solved by using the method of a domain decomposition analysis a
In recent years, the Global Navigation Satellite Services (GNSS) technology has been frequently employed for monitoring the Earth crust deformation and movement. Such applications necessitate high positional accuracy that can be achieved through processing GPS/GNSS data with scientific software such as BERENSE, GAMIT, and GIPSY-OSIS. Nevertheless, these scientific softwares are sophisticated and have not been published as free open source software. Therefore, this study has been conducted to evaluate an alternative solution, GNSS online processing services, which may obtain this privilege freely. In this study, eight years of GNSS raw data for TEHN station, which located in Iran, have been downloaded from UNAVCO website
... Show MoreThe research aims to answer the questions that revolve in the mind of mankind about how to create creation, how it existed prior to creation, who created existence, and the characteristics of that presence. The researcher also wanted to show that the culture of Imam Ali (peace be upon him) In the book of Adam, peace be upon him, God has punished Adam (peace be upon him) for not having sinned. Because his wife is the one who fed him the fruit of the tree, and this is contrary to what was stated in the sermon of Imam (peace be upon him) who Z Adam (peace be upon him) is the one who trusted Satan and Gwighth.
We note that the approach of the rhetoric has pointed to the creation of angels and did not refer to
... Show More