Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
A confluence of forces has brought journalism and journalism education to a precipice. The rise of fascism, the advance of digital technology, and the erosion of the economic foundation of news media are disrupting journalism and mass communication (JMC) around the world. Combined with the increasingly globalized nature of journalism and media, these forces are posing extraordinary challenges to and opportunities for journalism and media education. This essay outlines 10 core principles to guide and reinvigorate international JMC education. We offer a concluding principle for JMC education as a foundation for the general education of college students.
This paper is concerned with preliminary test single stage shrinkage estimators for the mean (q) of normal distribution with known variance s2 when a prior estimate (q0) of the actule value (q) is available, using specifying shrinkage weight factor y( ) as well as pre-test region (R). Expressions for the Bias, Mean Squared Error [MSE( )] and Relative Efficiency [R.Eff.( )] of proposed estimators are derived. Numerical results and conclusions are drawn about selection different constants including in these expressions. Comparisons between suggested estimators with respect to usual estimators in the sense of Relative Efficiency are given. Furthermore, comparisons with the earlier existi
... Show MoreA reliability system of the multi-component stress-strength model R(s,k) will be considered in the present paper ,when the stress and strength are independent and non-identically distribution have the Exponentiated Family Distribution(FED) with the unknown shape parameter α and known scale parameter λ equal to two and parameter θ equal to three. Different estimation methods of R(s,k) were introduced corresponding to Maximum likelihood and Shrinkage estimators. Comparisons among the suggested estimators were prepared depending on simulation established on mean squared error (MSE) criteria.
Five samples of the ternary alloy Ge-S-Cd were created using the melting point method, and the effects of partially substituting cadmium for germanium were determined. and partial substitution of germanium by cadmium was used to study the change in electrical conductivity. Electrical experiments were performed on Ge35-xS65Cdxternary alloy with x = 0, 5, 10, 15, and 20. It was discovered that the conductivity (σdc) rises with rising temperature in all samples under experiment. This confirms that the samples have semiconductor behavior. It has been observed that there are three regions of electrical conductivity in the electrical conductivity curve at low, moderate, and high temperatures. The pr
... Show MoreA laboratory experiment was carried out in the laboratories of College of Agricultural Engineering Sciences, University of Baghdad in 2017. Three factors were studied; Sorghum bicolor L. cultivars (Inqath, Rabeh and Buhoth70), primed and unprimed seed, and salt stress (0, 6, 9 and 12 dS.m−1). The aim was to improve germination and seedling growth under salt stress. The results showed significant superiority of Buhoth70 cultivar compared to others, significantly superiority of primed seed compared to the unprimed and significant negative impact as long as increasing levels of salt stress at germination ratio, plumule length, dry seedling weight and seedling vigor index. The interaction between cultivars, priming and salt stress showed that
... Show MoreAbstract Throughout this paper R represents commutative ring with identity and M is a unitary left R-module, the purpose of this paper is to study a new concept, (up to our knowledge), named St-closed submodules. It is stronger than the concept of closed submodules, where a submodule N of an R-module M is called St-closed (briefly N ≤Stc M) in M, if it has no proper semi-essential extensions in M, i.e if there exists a submodule K of M such that N is a semi-essential submodule of K then N = K. An ideal I of R is called St-closed if I is an St-closed R-submodule. Various properties of St-closed submodules are considered.
In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreThe aim of this paper is to introduce and study the notion type of fibrewise topological spaces, namely fibrewise fuzzy j-topological spaces, Also, we introduce the concepts of fibrewise j-closed fuzzy topological spaces, fibrewise j-open fuzzy topological spaces, fibrewise locally sliceable fuzzy j-topological spaces and fibrewise locally sectionable fuzzy j-topological spaces. Furthermore, we state and prove several Theorems concerning these concepts, where j = {δ, θ, α, p, s, b, β}.
The Disi water samples were collected from different Disi aquifer wells in Jordan using a clean polyethylene container of 10-liter size. A hyper-pure germanium (HPGe) detector with high- resolution gamma-ray spectroscopy and a low background counting system was used for the identification of unknown gamma-rays emitting from radionuclides in the environmental samples. The ranges of specific activity concentrations of 226Ra and 228Ra in the Disi aquifer water were found to be from 0.302 ± 0.085 to 0.723 ± 0.207 and from 0.047 ± 0.010 to 0.525 ± 0.138 Bq L−1, with average values of 0.516 ± 0.090 and 0.287 ± 0.091 Bq L−1, respectively. The average combined radium (226Ra + 228Ra) activity and radium activity ratio (228Ra/226Ra) in Disi
... Show MoreThe aim of this paper is to introduce and study new class of fuzzy function called fuzzy semi pre homeomorphism in a fuzzy topological space by utilizing fuzzy semi pre-open sets. Therefore, some of their characterization has been proved; In addition to that we define, study and develop corresponding to new class of fuzzy semi pre homeomorphism in fuzzy topological spaces using this new class of functions.