Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
Most companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Mak
... Show Moreأشارت الجهود المعرفية السابقة إلى وجود اهتمام متزايد بالجماعات (Groups) على أساس أنها اللبنات الأساسية لقيام المنظمات. وقد فرض تعدد المنظمات في المجتمعات المعاصرة وتباينها من حيث أهدافها وطبيعة نشاطها، تجزئة فعالياتها إلى تخصصات عدة على وفق إطار تقسيم العمل، وبما أدى إلى تقسيم الأفراد العاملين إلى جماعات مختلفة في أدائها وأحجامها وشكلها، والتي تعمل جميعها لتحقيق هدف&
... Show Moreالمستخلص
تتميز هذه الورقة بتناولها موضوعاً يخشى الكثيرون الخوض فيه للملابسات الدائرة حوله، وهو اصحاب المصالح كموضوع مهم في الفكر الستراتيجي. فخاضت في مفاهيمه العامة وتصنيفاته ومنظوراته، ووجدت في مفهومه بأنهم اولئك الذين يمكن تمثيلهم بالمجاميع او الوحدات المستقلة التي ترتبط بمنظمة الاعمال عبر شبكة علاقات مؤثرة مختلفة الابعاد والاتجاهات، واذا ما حدث أي خلل في توازن هذه العلاقات، قد ت
... Show MoreThe aim of the research was to prepare Pilates exercises using the barrel ladder apparatus and to identify the effect of Pilates exercises on agility, coordination, and motor sequences of third-year female students in artistic gymnastics. The researcher adopted the experimental method to achieve the objectives of the study and to verify its hypotheses, as it is suitable for the nature and problem of the research. In selecting the research population, the researcher carefully chose the sample using a purposive method, clarifying its elements and constituent units. The research population consisted of third-year female students at the College of Physical Education and Sports Sciences for Women / University of Baghdad, with a total of 20 stud
... Show MoreThe two parameters of Exponential-Rayleigh distribution were estimated using the maximum likelihood estimation method (MLE) for progressively censoring data. To find estimated values for these two scale parameters using real data for COVID-19 which was taken from the Iraqi Ministry of Health and Environment, AL-Karkh General Hospital. Then the Chi-square test was utilized to determine if the sample (data) corresponded with the Exponential-Rayleigh distribution (ER). Employing the nonlinear membership function (s-function) to find fuzzy numbers for these parameters estimators. Then utilizing the ranking function transforms the fuzzy numbers into crisp numbers. Finally, using mean square error (MSE) to compare the outcomes of the survival
... Show MoreMusicality is a fundamental feature of poetry that takes the interest of scholars and critics. Most poets rely on a variety of literary devices and techniques to bring music to their work like rhymes - words that appear at the end of lines in poetry - and on arranging words techniques in such a way to create a pseudo melody, which is achieved primarily by patterning (or repeating) certain sounds. Such a poetic rhetorical and verbal enhancer’s aspect represented ever since the beginning of the classical poetry has been manifested more evidently in Nali’s poetry. His poetry is marked with particular letters that have played a substantial role in the rhyming that rings like cymbals or jingle like internal elevated rhymes. Within a descr
... Show MoreIn this research, carbon nanotubes (CNTs) is prepared through the Hummers method with a slight change in some of the work steps, thus, a new method has been created for preparing carbon nanotubes which is similar to the original Hummers method that is used to prepare graphene oxide. Then, the suspension carbon nanotubes is transferred to a simple electrode position platform consisting of two electrodes and the cell body for the coating and reduction of the carbon nanotubes on ITO glass which represents the cathode electrode while platinum represents the anode electrode. The deposited layer of carbon nanotubes is examined through the scanning electron microscope technique (SEM), and the images throughout the research show the
... Show MoreThe uptake of Cd(II) ions from simulated wastewater onto olive pips was modeled using artificial neural network (ANN) which consisted of three layers. Based on 112 batch experiments, the effect of contact time (10-240 min), initial pH (2-6), initial concentration (25-250 mg/l), biosorbent dosage (0.05-2 g/100 ml), agitation speed (0-250 rpm) and temperature (20-60ºC) were studied. The maximum uptake (=92 %) of Cd(II) was achieved at optimum parameters of 60 min, 6, 50 mg/l, 1 g/100 ml, 250 rpm and 25ºC respectively.
Tangent sigmoid and linear transfer functions of ANN for hidden and output layers respectively with 7 neurons were sufficient to present good predictions for cadmium removal efficiency with coefficient of correlatio
... Show MoreIn light of the rapid changes in the business environment and the entry of administrative leaders in the challenges of the atheist and twenty- increasing competition between sectors and the desire to acquire the skills, the traditional methods are no longer viable, which requires doing evaluates performance according to a more holistic, rather than limiting the performance evaluation on the financial hub that has not longer enough alone, as well as benchmarking method that has proven successful in developed countries as a way to develop and improve products and services.
I've touched your search to the development of indicators evaluating the performance and preparation of a mechanism for making comparisons of reference between o
... Show MoreAbstract
Praise be to God, Lord of the Worlds, and prayers and peace be upon the most honorable of creation, Muhammad, whom God sent as a mercy to the worlds, and his infallible, pure, and pure family, and his faithful companions
I did not find anyone who studied stylistic structures except for one study, which is (The Literature of Imam Al-Jawad (peace be upon him), a stylistic study by the student Mina Reda Kazem, a master’s thesis), and it did not address the Hadi and the military men (peace be upon them) as the text of those texts. Coherently complementing each other.
I decided to stand by this heritage as a single text in a uniform period of time approximately from the year 195-260 AH, some
... Show More