Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
Abstract
The research aims to measure family negligence and its relationship with internet addiction among university students. The researcher has developed a scale of (20) items to measure the negligence of family, which was applied to (308) male and female university students in the first and fourth stages. The research concluded that University students suffer from family negligence. The research sample has an addiction to the Internet. There is a relationship between family neglect and addiction to the Internet among university students. The researcher came out with a number of suggestions and recommendations.
In this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including: network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de
... Show MoreBackground: Most primary hypothyroidism patients also experience inefficiency and irregularity. It is possible to understand the significance of myo-inositol in treating the thyroid gland by relating it to the synthesis of thyroid hormones. Study aimed to estimate serum of inositol 1,4,5-triphosphate (IP3) in primary hypothyroidism disorder and through that level it can shed light on whether it is accused of inactivity of the thyroid gland and at the same time open the doors for the use as a treatment.
Subject and Methods: The study was taken from the analytical cross-sectional design.120 subjects were divided into three groups, the first group included 40 healthy subjects, the s
... Show MoreDBN Rashid, Asian Quarterly: An International Journal of Contemporary Issue, 2018
Background :The incidence of bile ducts injuries( BDI )has risen from) 0.1 to 0.2%( to) 0.4 to 0.6% ( between the era of open cholecystectomy( O C) and the age of laoaroscopic cholycystectomy( LC.) The aim of the study is to review the management and surgical outcome of the bile duct injuries in gastroenterology and hepatology teaching hospital .Methods: This study is Prospective, done in G.I.T hospital ,From January 2008 –to –February 2011, patients included in this study had prevouse history of cholecystectomy which followed by sign and symptoms of bile duct injures .Most patients have been reffered from other hospitals,supprting therapy were given to them and investigations performed to evaluate the the type of injureis ,minor inj
... Show MoreAbstract
The current research aims to identify the role of family upbringing methods in shaping adolescent gender identity disorder, to identify the causes, components, and disorders of the gender identity of adolescents, and to develop practical visions and suggestions to reduce and stop gender identity disorder completely. Due to the sensitivity of the topic, a questionnaire of five open-ended questions was posted on Facebook to collect the needed data, where (20) respondents answered these questions. The researcher took these (20) respondents as the study sample. The results revealed that excessive emancipation within the family, failure to employ family protection laws, and failure to monitor and follow up on
... Show MoreDue to the importance of nanotechnology because of its features and applications in various fields, it has become the focus of attention of the world and researchers. In this study, the concept of nanotechnology and nanomaterials was identified, the most important methods of preparing them, as well as the preparation techniques and the most important devices used in their characterization.
This study aims to studying of Person and organization’s environment fit in a sample of Private bank’s reflection in its basic dimensions (Person-organization fit ,Person-Job fit, Person-group fit and Person- Person-fit )in the Work Outcomes (job satisfaction, the intention to leave the job, Job Engagement, and organizational citizenship behavior ).
The questionnair’e has been used as a basic instrument to gather data , As well as personal interviews with some of the staff of the research sample of private banks which were represented by (5) and included banks (Bank of Assyria for investment, the North Bank for Finance and Investment , Bank of the Tigris
... Show More