Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
The path and its nodal purposes
Abstract
This study has come to indicate the doctrinal purposes of faith in this path، It was composed of an introduction and four demands، as follows:
The first requirement: the intentions of distinguishing between the ranks of people according to divine justice، as those who pass by him are different. Some of them are safe by his work، surviving from the fire، and some of them are not peace، he falls into the fire of Hell، and all of them are different in their ranks in a manner consistent with the justice of God Almighty and the works they have given themselves.
The second requirement: the purposes of divine mercy in honoring the Prophet and his nation on the path and embodying their
Insulin like growth factor-1 has metabolic and growth-related roles all over the body and is strongly associated and regulated by growth hormone. It is produced by almost any type of tissue, especially the liver. The study aimed to measure insulin like growth factor in growth hormone deficient patients and find its relation with other studied parameters. The Subjects in the study were 180 studied in the National Diabetic Center for Treatment and Research/Al-Mustansiriya University in Baghdad/Iraq for the period from November 2021 to April 2022. Blood was drawn and investigated for the levels of IGF-1, IGFBP-3, LH, and FSH. Also testosterone and statistical analysis was carried out to find the potential correlations. The results relived t
... Show MoreThis study was conducted to prepare protein concentrates from AL-Zahdidate’s pits by using alkaline methods where the chemical composition of the pits were (7.30, 1.04, 5.80, 8.68 and 77.19) % for each of the moisture, ash, protein, fat and carbohydrates respectively and the chemical composition of the concentrate protein was (6.62, 4.10, 26.70, 0.93, and 58.65) % respectively. The content of protein concentrate from the metallic elements (144.07, 25.11, 15.02, 0.49, 0.59, 0.27, 0.22 and 234.6) mg/ 100 g each of potassium, magnesium, calcium, iron, manganese, copper, zinc and phosphorus respectively. The results of SDS-PAGE showed five bands with weights molecular ranged between 11000-70000 Dalton. Give the biscuit which contain protei
... Show MoreThe research emphasizes importance of preliminary drawings in design of any product. Therefore, using of simulation as tools for visual thinking in developing drawing and design skills. So that practice of drawing by hand, considering shape of ideas in first stage of visualizations, and practice of its techniques and continuous training.
Hence, the research problem arose with the role of simulation method for developing preliminary sketches in the sample of students of the Product Design Department at the College of Design and Art, PNU, as it is important tool for visual thinking that helps the designer in designing and producing innovative artistic works.
Therefore, the research axes, a number of findings and recommendations were
The present research included synthesis of silver nanoparticle from(1*10-3,1*10-4 and1*10-5) M aqueous AgNO3 solution through the extract of M.parviflora reducing agent. In the process of synthesizing silver nanoparticles we detected a rapid reduction of silver ions leading to the formation of stable crystalline silver nanoparticles in the solution.
The coordination ability of the azo-Schiff base 2-[1,5-Dimethyl-3-[2-(5-methyl-1H-indol-3-yl)-ethyl imino]-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylazo]-5- hydroxy-benzoic acid has been proven in complexation reactions with Co(II), Ni(II), Cu(II), Pd(II) and Pt(II) ions. The free ligand (LH) and its complexes were characterized using elemental analysis, determination of metal concentration, magnetic susceptibility, molar conductivity, FTIR, Uv-Vis, (1H, 13C) NMR spectra, mass spectra and thermal analysis (TGA). The results confirmed the coordination of the ligand through the nitrogen of the azomethine, Azo group (Azo) and the carboxylate ion with the metal ions. The activation thermodynamic parameters, such as ΔE*, ΔH*, ΔS*, ΔG*and K are cal
... Show MoreIn the present study, chitosan Schiff base has been prepared from chitosan reaction with p-chloro benzaldehyde. The AuNPs and AgNPs were manufactured by extract of onion peels as a reducing agent. The AuNPs and AgNPs that have been synthesized were characterized through UV-vis spectroscopy, XRD analyses and SEM microscopy. The polymer blends of the chitosan / PEG has been prepared by using the approach of solution casting. Chitosan Schiff base / PEG Au and Ag nanocomposites were synthesized, nanocomposites and polymer blends have been characterized by FTIR which confirm the formation of Schiff base by revealing a new band of absorption at 1693 cm-1 as a result of the (C=N) imine group. FESEM, DSC and TGA confirm the thermal stability
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreThis study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show More