Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
The current research aims to build a training program for chemistry teachers based on the knowledge economy and its impact on the productive thinking of their students. To achieve the objectives of the research, the following hypothesis was formulated:
There is no statistically significant difference at (0.05) level of significance between the average grades of the students participating in the training program according to the knowledge economy and the average grades of the students who did not participate in the training program in the test of productive thinking. The study sample consisted of (288) second intermediate grade students divided into (152) for the control group
... Show MoreAbstract
This study aims to identify the extent to which the criteria of the American Council for Teaching Foreign Languages (ACTFL) are included in the English language books for the fifth and sixth graders. To achieve the objective of the study, a content analysis card was prepared, where the classification of language proficiencies was divided into five main levels (beginner, intermediate, advanced, superior, and distinguished) of the four language skills (listening, speaking, reading, and writing), The content analysis card consisted of (89) indicators distributed at the four levels of language skills as follows: Listening (17), speaking (33), reading (15), and writing (26). The study sample consisted of Engl
... Show MoreIn this paper, the system of the power plant has been investigated as a special type of industrial systems, which has a significant role in improving societies since the electrical energy has entered all kinds of industries, and it is considered as the artery of modern life.
The aim of this research is to construct a programming system, which could be used to identify the most important failure modes that are occur in a steam type of power plants. Also the effects and reasons of each failure mode could be analyzed through the usage of this programming system reaching to the basic events (main reasons) that causing each failure mode. The construction of this system for FMEA is dependi
... Show MoreLasmiditan (LAS) is a recently developed antimigraine drug and was approved in October, 2019 for the treatment of acute migraines; however, it suffers from low oral bioavailability, which is around 40%.
This study aimed to improve the LAS bioavailability via formulation as nanoemulsionbased in situ gel (NEIG) given intranasally and then compare the traditional aqueous-LASsuspension (AQS) with the two successful intranasal prepared formulations (NEIG 2 and NEIG 5) in order to determine its relative bioavailability (F-relative) via using rabbits.
Abstract: Two different shapes of offset optical fiber was studied based on coreless fiber for refractive index (RI)/concentration (con.) measurement, and compare them. These shapes are U and S-shapes, both shapes structures were formed by one segment of coreless fiber (CF) was joined between two single mode (SMF) lead in /lead out with the same displacement (12.268µm) at both sides, the results shows the high sensitive was achieved in a novel S-shape equal 98.768nm/RIU, to our knowledge, no one has ever mentioned or experienced it, it’s the best shape rather than the U-shape which equal 85.628nm/RIU. In this research, it was proved that the offset form has a significant effect on the sensitivity of the sensor. Addi
... Show MoreThe Nahr Umr Formation, one of the most important Cretaceous formations and one of the main generating reservoirs in southern Iraq and neighboring regions, was chosen to study and estimate its petrophysical properties using core plugs, lithofacies, and well logs from five wells in the Noor oilfield. Reservoir properties and facies analyses are used to divide the Nahr Umr formation into two-member (limestone in the upper part and main sandstone in the lower). Limestone members are characterized by low reservoir properties related to low effective porosity and permeability while the main sandstone member is considered as a reservoir. Four lithofacies were recognized in the main sandstone member of the Nahr Umr Formation according to petrog
... Show MoreVideo copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show MoreThis project sought to fabricate a flexible gas sensor based on a short functionalized multi-walled carbon nanotubes (f-MWCNTs) network for nitrogen dioxide gas detection. The network was prepared by filtration from the suspension (FFS) method and modified by coating with a layer of polypyrrole conductive polymer (PPy) prepared by the oxidative chemical polymerization to improve the properties of the network. The structural, optical, and morphological properties of the f-MWCNTs and f-MWCNTs/PPy network were studied using X-ray diffraction (XRD), Fourie-transform infrared (FTIR), with an AFM (atomic force microscopy). XRD proved that the structure of f-MWCNTs is unaffected by the synthesis procedure. The FTIR spectra verified the existence o
... Show MoreDiscussion dealt with the independent factors critical such us success factors and the risk management process, and dependent factor of the general competitive strategies, and began searching the dilemma of thought, as crystallized his problem in the light of the need for organizations to philosophy and deeper vision of a more comprehensive understanding of the concept of risk management, assessment and management to maximize the competitive strategies of public, and on this basis, Search queries formulated problem of the gap between the knowledge-based intellectual propositions farcical for the purposes of interpretation of the relationship between the critical success factors and the risk
... Show More