Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
In this paper,we focus on the investigated and studied of transition rate in metal/organic semiconductor interface due to quantum postulate and continuum transition theory. A theoretical model has been used to estimate the transition rate cross the interface through estimation many parameters such that ;transition energy ,driving electronic energy U(eV) ,Potential barrier ,electronic coupling ,semiconductor volume ,density ,metal work function ,electronic affinity and temperature T. The transition energy is critical facter of charge transfer through the interfaces of metal organic films device and itscontrol of charge injection and transport cross interface. However,the potential at interfa
... Show MoreThis research aims to identify the cognitive distortion of kindergarten children and its relationship to their parenting reinforcement. The researcher used the descriptive approach, being the closest to reaching the study objectives, To measure the relationship between the research variables, the researcher prepared two questionnaire tools for this purpose, the first for measuring "cognitive distortion", And the second is to measure "parental reinforcement", and each tool consisted of (20) items.
After ensuring the validity and reliability of the two research tools and their suitabi
... Show MoreReading is an interactive process that goes on between the reader and the text, resulting in comprehension. The text presents letters, words, sentences, and paragraphs that encode meaning. The reader uses knowledge, skills, and strategies to determine what that meaning is. Reading comprehension is much more than decoding; it results when the reader knows which skills and strategies are appropriate for the type oftext, and understands how to apply them to accomplish the reading purpose.Reading comprehension is important because without it reading is nothing more than tracking symbols on a page with your eyes and sounding them out leaving the reader with no information. Instead of promoting traditional approaches, reading should be taught
... Show MoreThis study is at the heart of the pragmatic theory, as this research seeks to highlight the concept of necessity, and what the researchers have tended to do is that the development that has acquired integrated pragmatics is only for the development of the subject of necessity, as it is one of the contents of the saying, and this is what made Decroux define it as the semantic element that Concerning the saying, as for Grace; He paid great attention to the conversational imperative, and understood the requirement by clues or suggestions, as it is an element known for its absence and presence in the linguistic structures included in the text when reading or when understanding. This study has paved the way for clarifying the concept of necessi
... Show MoreThis research aims to study a range of yet and future variables that can affect human resources in Iraq and public organizations that influence the size of each, and the extent of its contribution to the development of human resources through the National Investment Commission of Baghdad. The identified research problem in a set of questions was the most important, what are the variables that help in the development of human resources to the Investment Commission of Baghdad theme of the search, in order to achieve the goal of research and answer questions about the problem, applied research on both the research community's (55) individual executives and employees.
Researcher has identified a r
... Show More<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe
... Show MoreDoppler broadening technique is suggested to monitor the development of tumours. It depends on the sensitivity of positronium (Ps) annihilation parameters to the sub- microstructural changes in biological tissues. This technique uses high resolution HpGe detector to measure the lineshape parameters (S and W) in normal mice's mammary tissues and adenocarcinoma mammary tissues as a function of tumour growth. The results demonstrate that the central parameter (S) decreases and the wing parameter (W) increases as the tumour grow. It is found that the S parameter changes considerably with the distribution of voids which are affected by the tumour development. Therefore the present technique can successfully be employed to monitor the developm
... Show More