Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
The purpose of this research is to identify heritage and highlight its value by drawing on its decorative vocabulary and integrating it with the Arabic calligraphy to revive the heritage in a contemporary style, and to create decorative design units inspired by Sadou and Arabic calligraphy and to employ them in the modern fashion designs. The applied descriptive approach has been used in this research, and the research community is made of women in Riyadh area. The tools used in this research were the questionnaire and the observation. The most important results of the research are: the design of decorative units from the integration of Arabic calligraphy and the decorations of the Saduo, and the use of these units in the design of the o
... Show MoreThis research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen
The development of information systems in recent years has contributed to various methods of gathering information to evaluate IS performance. The most common approach used to collect information is called the survey system. This method, however, suffers one major drawback. The decision makers consume considerable time to transform data from survey sheets to analytical programs. As such, this paper proposes a method called ‘survey algorithm based on R programming language’ or SABR, for data transformation from the survey sheets inside R environments by treating the arrangement of data as a relational format. R and Relational data format provide excellent opportunity to manage and analyse the accumulated data. Moreover, a survey syste
... Show MoreThere is an assumption implicit but fundamental theory behind the decline by the time series used in the estimate, namely that the time series has a sleep feature Stationary or the language of Engle Gernger chains are integrated level zero, which indicated by I (0). It is well known, for example, tables of t-statistic is designed primarily to deal with the results of the regression that uses static strings. This assumption has been previously treated as an axiom the mid-seventies, where researchers are conducting studies of applied without taking into account the properties of time series used prior to the assessment, was to accept the results of these tests Bmanueh and delivery capabilities based on the applicability of the theo
... Show Morestudy aimed to recognize the relationship shyness and depression and to recognize the differences between the genders, according to the variable of shyness and depression, the sample consisted (214) students, (141) female (73) male, and the sample responded scale of shyness and Inventory beck for depression, The Results of this study show that: the sample has a low degree shyness and a high degree depression, . There are no statistically significant differences according to gender variable in shyness, and there are statistically significant differences according to gender variable in depression favor for male, and there are statistically significant relationships between the variables of the study at lev
... Show MoreWhich was entitled : Aesthetic and dramatic dimensions of silence in the feature film , and the researcher clearly define after removing the confusion existing in some authorized sources , as for the concept of silence , adopted in this research is : the death of the audio stream , Hence the researcher shed a light on the aesthetic and the dramatic role of silence in the feature film , through the handing of the silent scenes ( absolute silence ) in the film research divided this research into four chapters . This first Chapter includes : methodological framework , which represents the research problem , which came with the following question : what is the mechanism of productive silence to the
... Show Moreالتعددية الثقافية هي مفهوم يتعلق بالمجتمعات التي تضم ثقافات عده، أو العالم الذي يتضمن ثقافات متنوعة؛ فالتعددية هي التنوع الثقافي والفكري؛ وبالتالي هي عنصر إثراء للإنسانية وأساس لوجودها؛ فالتعددية الثقافية تتضمن القبول بالثقافات والافكار الانسانية كلها، وإفساح المجال أمامها للمشاركة في بنا ء الثقافة والفكر العالمي؛ وهكذا فإنها تتمثل في التسامح مع الثقافات والافكار المختلفة الاعتراف بالهويات والخصوصيات
... Show MoreBased on Lyapunov exponent criterion, the aircraft lateral-directional stability during critical flight cases is presented. A periodic motion or limit cycle oscillation isdisplayed. A candidate mechanism for the wing rock limit cycle is the inertia coupling between an unstable lateral-directional (Dutch roll) mode with stable longitudinal (short period) mode. The coupling mechanism is provided by the nonlinear interaction of motion related terms in the complete set equations of motion. To analyze the state variables of the system, the complete set of nonlinear equations of motion at different high angles of attack are solved. A novel analysis including the variation of roll angle as a function of angle of attack is proposed. Furthermore
... Show MoreThe best proximity point is a generalization of a fixed point that is beneficial when the contraction map is not a self-map. On other hand, best approximation theorems offer an approximate solution to the fixed point equation . It is used to solve the problem in order to come up with a good approximation. This paper's main purpose is to introduce new types of proximal contraction for nonself mappings in fuzzy normed space and then proved the best proximity point theorem for these mappings. At first, the definition of fuzzy normed space is given. Then the notions of the best proximity point and - proximal admissible in the context of fuzzy normed space are presented. The notion of α ̃–ψ ̃- proximal contractive mapping is introduced.
... Show MoreEvery era characterizes with its thought and life philosophy , where Muslims left behind them educational and intellectual heritage we should proud of it because it reflects the image of past and lights the way of present and future path where we should make use of it to fit with our statuesque and contemporary issues because we don’t know about it but little as result of ignorance or imitation of the western culture.
It’s wrong to regard heritage from the past but aphasia of Islamic and Arab genies that its roots tracing back to past and extending to future .
Islamic Arab educational thought regards one of the ric
... Show More