Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
The research aimed to identify the effectiveness of instructional design according to whole brain theory of Herman in the achievement of chemistry at the fifth scientific students at a secondary school of the General Directorate for Educational in Diyala / Baladruz in Iraq. The research sample Consisted of (57 student, (29) students as experimental group studied according to instructional design strategies for whole brain theory of Herrmann and (28) a student as a control group studied by the usual way for two semesters, a prepared achievement test as article and objective type of multiple choice, the coefficient stability of alpha-Cronbach equation reached (0.86). The research Results showed the presence of a statistically significant d
... Show MoreThe exchange rate is of great importance at the global and local levels alike, as this importance increases with the increasing rates of development of economic relations between countries of the world due to openness and integration into the global economy, expressed by the expansion of the volume of trade and financial relations between countries. The Central Bank of Iraq has set the need to stabilize this price as a goal to reduce inflation rates and reduce them to the internationally accepted rates by using the foreign currency sale window to achieve a balance between the forces of supply and demand for foreign currency and to preserve the value of the Iraqi dinar. The research concluded that the central bank was It has a maj
... Show MoreSecond language learner may commit many mistakes in the process of second language learning. Throughout the Error Analysis Theory, the present study discusses the problems faced by second language learners whose Kurdish is their native language. At the very stages of language learning, second language learners will recognize the errors committed, yet they would not identify the type, the stage and error type shift in the process of language learning. Depending on their educational background of English as basic module, English department students at the university stage would make phonological, morphological, syntactic, semantic and lexical as well as speech errors. The main cause behind such errors goes back to the cultural differences
... Show MoreIn this study, Zizphus spina-christi leaf powder was applied for the adsorption of methyl orange. The effect of different operating parameters on the Batch Process adsorption was investigated such as solution pH (2-12), effect of contact time (0-60 min.), initial dye concentration (2-20 mg/L), effect of adsorbent dosage (0-4.5 g) and effect of temperature (20-50ᵒC). The results show a maximum removal rate and adsorption capacity (%R= 23.146, qe = 2.778 mg/g) at pH = 2 and equilibrium was reached at 40 min. The pseudo- second-order kinetics were found to be best fit for the removal process (R2 = 0.997). Different isotherm models (Langmuir, Freundlich, Dubini-Radushkevich,Temkin) were applied in this stud
... Show MoreThe current research aims to identify the effect of the program to develop the skill of friendship among kindergarten children, as well as the scope of the impact of the program on the sample. To achieve the objectives of the research, the researcher hypothesizes there is no significant difference between the average scores of the sample members on the friendship skill scale for the dimensional scale according to the experimental and control group. The research sample consisted of (60) girl and boy with age ranges (4-6) who were randomly selected from the Kindergarten Unity at Baghdad city/ Rusafa 1. The children were distributed into an experimental and control group, each group consists of (30) girl and boy. The two groups were chosen
... Show MoreLet G be a finite group and X be a G-conjugacy of elements of order 3. The A4-graph of G is a simple graph with vertex set X and two vertices x,yÎX are linked if x≠ y and xy-1 is an involution element. This paper aims to investigate the A4-graph properties for the monster Held group He.
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreThe secure data transmission over internet is achieved using Steganography. It is the art and science of concealing information in unremarkable cover media so as not to arouse an observer’s suspicion. In this paper the color cover image is divided into equally four parts, for each part select one channel from each part( Red, or Green, or Blue), choosing one of these channel depending on the high color ratio in that part. The chosen part is decomposing into four parts {LL, HL, LH, HH} by using discrete wavelet transform. The hiding image is divided into four part n*n then apply DCT on each part. Finally the four DCT coefficient parts embedding in four high frequency sub-bands {HH} in
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreDensity Functional Theory at the generalized-gradient approximation level coupled with large unit cell method is used to simulate the electronic structure of (II-VI) zinc-blende cadmium sulfide nanocrystals that have dimensions 2-2.5 nm. The calculated properties include lattice constant, conduction and valence bands width, energy of the highest occupied orbital, energy of the lowest unoccupied orbital, energy gap, density of states etc. Results show that lattice constant and energy gap converge to definite values. However, highest occupied orbital, lowest unoccupied orbital fluctuates indefinitely depending on the shape of the nanocrystal.