Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
The Fourth Industrial Revolution represents an advanced stage of technological development, characterized by the integration of digital, physical, and biological technologies, with a strong focus on smart connectivity and advanced data analysis. At the core of this revolution stands Artificial Intelligence (AI), which enables the processing of vast amounts of data, decision-making with speed and accuracy, automation of processes, and enhancement of productivity and quality. This research examines the transformative role of AI in the humanities, particularly in archaeological, historical, and geographical studies, where traditional methods face limitations in handling complex and extensive datasets.The study aims to highlight these l
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
Study of Direct Marketing techniques and determining the scope of the suitability of each of them in the application in the Iraqi market - An analytical and explorative study for sample of views for wholesaler in Baghdad. The essential idea of the research is to go into the most important concepts which have been mentioned in the direct marketing and determining its current and most important techniques and knowing the scope of applying these techniques in Baghdad main markets (Karrada, Jamilah, shorja, Baya area, zeyouna and new Baghdad) and which of those techniques most applicable in these markets. The research took a sample of (100) wholesalers who practice the activities of selling nutritional items, auto and outs spare part
... Show MoreThe plant licorice is considered important plants as nutritionally and medically and economically, as a rich in phytochemical, vitamins and minerals, and being widely available, Research indicated the presence of many nutrients such as (proteins, Carbohydrates, vitamins and minerals) as well as presence of Glycyrrhizin which responsible of sweet taste, that allowing the possibility to use it as natural intensity sweetener with few calories in Sweetening of many food. This research is aimed to study the Stability of Glycyrrhizin toward the various manufacturing conditions such as (thermal treatment, pH of foods and microwaves), so three factorial experiments was implemented to find out the Stability as following: 100C° - 121C° - Microwa
... Show MoreIn the current endeavor, a new Schiff base of 14,15,34,35-tetrahydro-11H,31H-4,8-diaza-1,3(3,4)-ditriazola-2,6(1,4)-dibenzenacyclooctaphane-4,7-dien-15,35-dithione was synthesized. The new symmetrical Schiff base (Q) was employed as a ligand to produce new complexes comprising Co(II), Ni(II), Cu(II), Pd(II), and Pt(II) metal-ions at a ratio of 2:1 (Metal:ligand). There have been new ligands and their complexes validated by (FTIR), (UV-visible), 1H-NMR, 13C-NMR, CHNS, and FAA spectroscopy, Thermogravimetric analysis (TG), Molar conductivity, and Magnetic susceptibility. The photostabilization technique to enhance the polymer was also used. The ligand Q and its complexes were mixed in 0.5% w/w of polyvinyl chloride in tetrahydrofuran
... Show MoreThe research aims to diagnose the causes of the phenomenon of Marketing deception catalog, which is now deployed in the Iraqi market and related to producers and marketers, consumers, regulators and other institutions) and their impact in the areas of prejudice to the consumer protection (product and signifying specifications, price, advertising, packaging), as well as identify differences in the sample responses according to personal variables, it has been the adoption of the resolution as a tool to collect data and information through a sample survey of consumer opinions totaling 108 people in shopping centers in the province of Baghdad and in the Karkh and Rusafa, It was the use of methods selected statistical represented by the arith
... Show MoreAbstract
The study aims to identify the extent to which the applied colleges at the University of Technology and Applied Sciences meet the comprehensive quality standards in light of the national education strategy for the 2040 Vision in the Sultanate of Oman. To do this, the researchers used the descriptive approach. They used a questionnaire as a tool for data collection that was applied to (237) administrators, academics, and support functions. The study found that the extent to which the applied colleges at the University of Technology and Applied Sciences meet the comprehensive quality standards in the light of the National Education Strategy 2040 in the Sultanate of Oman recorded a high range. The study als
... Show MoreProviding stress of poetry on the syllable-, the foot-, and the phonological word- levels is one of the essential objectives of Metrical Phonology Theory. The subsumed number and types of syllables, feet, and meters are steady in poetry compared to other literary texts that is why its analysis demonstrates one of the most outstanding and debatable metrical issues. The roots of Metrical Phonology Theory are derived from prosody which studies poetic meters and versification. In Arabic, the starting point of metrical analysis is prosodic analysis which can be attributed to يديهارفلا in the second half of the eighth century (A.D.). This study aims at pinpointing the values of two metrical parameters in modern Arabic poetry. To
... Show MoreOne of the main aims of Metrical Phonology Theory (MTT) is to provide the stress of poetry on the syllable, the foot, and the phonological word levels. Analyzing poetry embodies one of the most prominent and controversial metrical issues as the subsumed number and types of syllables, feet, and meters are balanced compared to other literary texts. The MTT saw the light during the late seventies (1975) and (1977) by Liberman and Prince, who produced it as part of non-linear phonology. Its roots originated in prosody, which studies poetic meter and versification. The basis of the metrical analysis is the prosodic analysis developed in London by Firth and his students in 1950. This study aims to identify the values of five metri
... Show More