Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
BN Rashid…, Special Education, 2022
Introduction to Medical Physics for Pharmacy Students and Medical Groups - ISBNiraq.org
The most common cause of upper respiratory tract infection is coronavirus, which has a crown appearance due to the existence of spikes on its envelope. D-dimer levels in the plasma have been considered a prognostic factor for COVID-19 patients.
The aim of the study is to demonstrate the role of COVID-19 on coagulation parameters D-dimer and ferritin with their association with COVID-19 severity and disease progression in a single-center study.
Hysterectomy is one of the most common gynecological operations done worldwide. Early diagnosis of the psychosexual effects of a hysterectomy and the fast application of appropriate treatment can prevent further worsening and persistence of symptoms, especially with respect to higher levels of anxiety, depression, lower self-esteem, and sexual impact after a hysterectomy. The aim of this study was to assess the psychological and sexual problems of women with hysterectomy. A descriptive study was carried out from March 1, 2023 to May 25, 2023 to determine the level of psychosexual problems experienced by women after hysterectomy. A purposive (non-probability) sample of 120 women who visited the outpatient clinic at Baghdad Teaching H
... Show MoreResource estimation is an essential part of reservoir evaluation and development planning which highly affects the decision-making process. The available conventional logs for 30 wells in Nasiriyah oilfield were used in this study to model the petrophysical properties of the reservoir and produce a 3D static geological reservoir model that mimics petrophysical properties distribution to estimate the stock tank oil originally in place (STOOIP) for Mishrif reservoir by volumetric method. Computer processed porosity and water saturation and a structural 2D map were utilized to construct the model which was discretized by 537840 grid blocks. These properties were distributed in 3D Space using sequential Gaussian simulation and the variation in
... Show MoreThe present study was carried out on forty eight epididymis of sexually mature dogs to elucidate light microscope features and the presence of testosterone receptors inside epididymis in different seasons. Twenty four dogs aged 3 years were used during the periods from 1/2/2015-1/2/2016. The epididymis were carefully dissected from the testis after orchidectomy operations and fixed, dehydrated, clarified and embedded in paraffin. Sections were stained with hematoxylin and eosin and periodic acid schiff. As well as, paraffin embedded cytoimmunochemistry technique was used for detection of testosterone receptors. Muscular coats showed no significant differences during different seasons or among segments. Epithelial heigh
... Show MoreIn recent days, the escalating need to seamlessly transfer data traffic without discontinuities across the Internet network has exerted immense pressure on the capacity of these networks. Consequently, this surge in demand has resulted in the disruption of traffic flow continuity. Despite the emergence of intelligent networking technologies such as software-defined networking, network cloudification, and network function virtualization, they still need to improve their performance. Our proposal provides a novel solution to tackle traffic flow continuity by controlling the selected packet header bits (Differentiated Services Code Point (DSCP)) that govern the traffic flow priority. By setting the DSCP bits, we can determine the appropriate p
... Show More