Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
The electronic characteristics, including the density of state and bond length, in addition to the spectroscopic properties such as IR spectrum and Raman scattering, as a function of the frequency of Sn10O16, C24O6, and hybrid junction (Sn10O16/C24O6) were studied. The methodology uses DFT for all electron levels with the hybrid function B3-LYP (Becke level, 3-parameters, Lee–Yang-Parr), with 6-311G (p,d) basis set, and Stuttgart/Dresden (SDD) basis set, using Gaussian 09 theoretical calculations. The geometrical structures were calculated by Gaussian view 05 as a supplementary program. The band gap was calculated and compared to the measured valu
... Show MoreBased on the theoretical ideas of E. Cassirer, a methodology is developed and an analysis of the painting work by J. Saleem, a representative of modern Iraqi painting, is carried out. While comparing the artistic programme of J. Saleem and the views of E. Cassirer, the methodological potential of the theory of the symbol for the art criticism analysis of the regional painting is clarified. Comparative analysis with the inclusion of the works of B. Buffet, B. Turetsky, J. Miro helps to see the multiple meanings of the same cultural symbol in thematically similar works of different years, created in different socio-cultural circumstances. The article shows that for regions with a shorter history (France, Russia, Spain, etc.), which have lo
... Show MoreThe research aims at the identity of the accounting information and its characteristics, and then to study the possibility of using accounting information in rationalizing the decisions of capital expenditure. The study relied upon the descriptive analytical approach it is suitable to the nature of this study, the hypotheses of the study were tested by using a number of statistical methods by relying on statistical package program (SPSS), and the research concluded that the companies listed in Khartoum Stock Exchange using accounting information in the comparison between investment alternatives available and estimating the number of years required to recover of the investment cost, the challenges that cause weakness in using the
... Show MoreSlurring Phenomenon And Throat Voices
Urban land price is the primary indicator of land development in urban areas. Land prices in holly cities have rapidly increased due to tourism and religious activities. Public agencies are usually facing challenges in managing land prices in religious areas. Therefore, they require developed models or tools to understand land prices within religious cities. Predicting land prices can efficiently retain future management and develop urban lands within religious cities. This study proposed a new methodology to predict urban land prices within holy cities. The methodology is based on two models, Linear Regression (LR) and Support Vector Regression (SVR), and nine variables (land price, land area,
... Show MoreExamining and comparing the image quality of degenerative cervical spine diseases through the application of three MRI sequences; the Two-Dimension T2 Weighed Turbo Spin Echo (2D T2W TSE), the Three-Dimension T2 Weighted Turbo Spin Echo (3D T2W TSE), and the T2 Turbo Field Echo (T2_TFE). Thirty-three patients who were diagnosed as having degenerative cervical spine diseases were involved in this study. Their age range was 40-60 years old. The images were produced via a 1.5 Tesla MRI device using (2D T2W TSE, 3D T2W TSE, and T2_TFE) sequences in the sagittal plane. The image quality was examined by objective and subjective assessments. The MRI image characteristics of the cervical spines (C4-C5, C5-C6, C6-C7) showed significant difference
... Show MoreDue to increased consumption of resources, especially energy it was necessary to find alternatives characterized by the same quality as well as being of less expensive, and most important of these alternatives are characterized by waste and the fact that humancannot stop consumption. So we have consideredwaste as an alternative and cheap economic resources and by using environmental index the MIP (input materials per unit ,unit / service) is based on the grounds that the product is not the end of itselfit is a product to meet the need of a product or service, awarded a resource input and output within the five basic elements are the raw materials is ecological, Raw materials ecological, water, air and soil erosion for a
... Show MoreAbstract :
The Aims of this research is to describe the concept of risk, its type and method of measurement, and to clarify the impact of these risks on the expected cash flow statement and the preparation of the target cash flow statement that takes these risks into consideration. Because the local economic environment is exposed to many risks, Therefore, this list will be predictive, which will help the economic unit to make administrative decisions, especially decisions related to operational, investment and financing activities. Therefore, the research problem is based on the fact that most of the local economic units are the list of flows According to the actual basis and not according to the discretionary basis (bud
... Show MoreFacial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no
... Show MoreIn the current work, aromatic amines and alkyl halides have been converted to the corresponding azides 2a‒d and 4a-d by the reaction with sodium nitrite and sodium azide respectively for amines and sodium azide for halides. Then, dipropargyl ether derivative of D-mannose 8 has been synthesized from diacetone mannose that has been obtained by the treatment of D-mannose (5) with dry acetone in the presence of sulfuric acid. Then, aldol condensation has been used to prepare diol 7 from the mannose diacetonide 6. The reaction of compound 7 with propargyl bromide in alkaline media has been afforded dipropargyl
... Show More