Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
During the course of fixed orthodontic therapy, patients should be instructed to eat specific food stuffs and beverages in order to maintain good health for the dentition and supporting structures and prevent frequent attachment debonding that prolong the treatment duration. After searching and collecting articles from 1930 till July 2021, the current review was prepared to emphasize various types of foods that should be taken during the course of fixed orthodontic therapy and to explain the effect of various food stuffs and beverages on the growth and development of craniofacial structures, tooth surfaces, root resorption, tooth movement, retention and stability after orthodontic treatment and the effect on the components of fixed ortho
... Show MoreThe Christian religion came in love and co-existence with all human beings, united in the minds of its people, including the great creation to form a strong unit of high ethics that contributes to the unity among the members of society and coexistence in security, peace and love of harmony.
Throughout this paper, T is a ring with identity and F is a unitary left module over T. This paper study the relation between semihollow-lifting modules and semiprojective covers. proposition 5 shows that If T is semihollow-lifting, then every semilocal T-module has semiprojective cover. Also, give a condition under which a quotient of a semihollow-lifting module having a semiprojective cover. proposition 2 shows that if K is a projective module. K is semihollow-lifting if and only if For every submodule A of K with K/( A) is hollow, then K/( A) has a semiprojective cover.
KE Sharquie, AA Noaimi, HA Salman, NA Hindy, Iraqi Postgraduate Medical Journal, 2009 - Cited by 1
Let R be a commutative ring with identity. R is said to be P.P ring if every principle ideal of R is projective. Endo proved that R is P.P ring if and only if Rp is an integral domain for each prime ideal P of R and the total quotient ring Rs of R is regular. Also he proved that R is a semi-hereditary ring if and only if Rp is a valuation domain for each prime ideal P of R and the total quotient Rs of R is regular. , and we study some of properties of these modules. In this paper we study analogue of these results in C.F, C.P, F.G.F, F.G.P R-modules.
To track scientific developments and achievements, for example, that (achieved) after the Second World War until this moment, make each of us in absolute amazement. He invented the computer, discovered the genetic factor (DNA), and discovered the drawing of the human genetic map, going up to the moon, penetrating outer space by satellites, getting close to distant planets, producing jet planes, microprocessors, and lasers, in addition to enabling a person to create a layer of The material is extremely thin and extremely imaginative. It has also become possible for a person to "dig lines that do not exceed 20 billion meters of thickness." The human being was also able to collect things an atom and build an efficient and high-precision con
... Show MoreThe aim of this research is to collect the semantically restricted vocabulary from linguistic vocabulary and make it regular in one wire with an in-depth study. This study is important in detecting the exact meanings of the language. On the genre, as shown in this research, and our purpose to reveal this phenomenon, where it shows the accuracy of Arabic in denoting the meanings, the research has overturned more than sixty-seven words we extracted from the stomachs of the glossaries and books of language, and God ask safety intent and payment of opinion.
The risks are considered as a large challenge facing the human communities. This challenge creates an economic and social burden which obstruct the community progress and influences on its evaluation in a negative way. In the last years, these risks began to increase and now it is necessary to face these risks in a regular and instructive methods in order to control over these risks and to limit its effects and reducing the losses, if it happened. The loss reduction and prevention programs produced by risks management are considered as a successful solution which enable to control these risks. These programs would not finish the danger in the community in a final way but it produces a practical solution reduces the negative effects and c
... Show More