Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
1-Alglul is the introduction of after prize or (Booty) secretly before it is divided, and the general sense is an absolute betrayal, and God has forbidden and the Prophet (Peace be upon him) by Muslims; such as bribery and gift-giving and other function by the terminology.
2-The signals and texts Alglul in the Covenant Rashidi and the Umayyad and Abbasid very few, compared to the Covenant of the Prophet, and so by the Quranic verses that were deprived Alglul and other Transmitting booty for the Muslims, and the hadith which magnified Alglul and showed its consequences in this life and the afterlife, and the tutelage of the Prophet (Peace be upon him) its active role in reducing Alglul, it was the great commandments included notificati
The aim of this paper is to introduce and study some of the Fibrewise minimal regular,Fibrewise maximal regular, Fibrewise minimal completely regular, Fibrewise maximal completely regular, Fibrewise minimal normal, Fibrewise maximal normal, Fibrewise minimal functionally normal, and Fibrewise maximal functionally normal. This is done by providing some definitions of the concepts and examples related to them, as well as discussing some properties and mentioning some explanatory diagrams for those concepts.
Aluminum oxide (ALO) was grafted by acrylic acid monomer (AlO-AM) and then, it was polymerized to produce alumina grafted poly(acrylic acid) (AlO-AP). The prepared AlO-AM and AlO-AP were characterized by Fourier-transform infrared, differential scanning calorimetry , thermogravemetric analyzer and particle size distribution. Adsorption equilibrium isotherms, adsorption kinetics and thermodynamic studies of the batch adsorption process were used to examine the fundamental adsorption properties of phenol (P) and p-chlorophenol (PCP). The experimental equilibrium adsorption data were analyzed by three widely used two-parameters Langmuir, Freundlich and DubininRadushkevich isotherms. The maximum P and PCP adsorption capacities based on t
... Show MoreThis topic is considered to be of a high degree of importance to every Muslim, and its importance is due to the fact that monotheism is:
Prove that God Almighty is the God who created everything and everything opposite to monotheism is polytheism, and it is taking other than God Almighty as a deity.
Therefore, we have to know the concept of God. If he is known, then he knows the concept of monotheism and the concept of polytheism
Iraq is Suffering nowadays from the criminal triad represented by the fiscal and administrative corruption, money laundering and terrorism, which are intertwined in a very related relations, as each of them support the other . Since the over growth has been one of its characteristics leaving behind a very dangerous negative effects whether it was social , economic or even political impacts . As a result , this trial is now represents a high risk that threatens the present and the future of Iraq . On the political , economic and social level , it is well to mention that the poor direct investment , the increasing rates of poverty , unemployment , inflation as well as the smuggling of goreign currency an
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.