Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
The study aims to identify the uses and the impact of social networking applications and websites on stock markets and their role in defining the details of dealing with stock movement and trading. The study also aims to highlight the role of these networks by increasing confidence in stock markets and companies as well as encouraging and inciting young people to invest in these markets, the study belongs to the descriptive analytical approach, the study population consisted of all current and potential investors in the stock and financial markets in the United Arab Emirates. The study used a questionnaire that was distributed to a number of followers of social networking pages and websites that deal with trading
... Show MoreThe main parameters and methods influencing the removal of Gentian Violet (GV) dye from aqueous media were investigated using a stachy plant in this study. The surface of the stachy plant was determined using FTIR spectra. Adsorption is influenced by the adsorbent's characteristic groups. The research took into account the usual conditions for GV dye adsorption by the stachy plant, such as the impact of contact time. Mass dosage , after 0.3 g the amount of adsorbed dye declines. Study pH and ionic strength, the results obtained showed that at pH 3 the largest adsorption of (GV) was seen, while at pH 9, the lowest adsorption was observed at 298 K, the adsorption kinetics and equilibrium constants were achieved, and the equilibr
... Show MoreNerium oleander known as oleander has belonged to the poisonous plants its habitat in a tropical andsubtropical region. The chemical analysis with GC-Mass of the alcoholic extract of oleander leaves revealedthat this plant has many chemical compounds more than 80 compounds and high-peaks about 29 compoundswhich are represented by alkaloids, phenol, terpenes, and fatty acid. HPLC analysis showed many essentialoils that have many biological effects.To evaluate the antibacterial activity of the alcoholic extract of N. oleander against locally isolatedPseudomonas aeroginosa the broth micro-dilution method was adapted to different concentrations werestarted from 3.9 to1000 mg/ml. The results revealed that the alcoholic extract has antiba
... Show MoreBACKGROUND: Sacral nerve stimulation (SNS) approved for use in North America since 1997 despite the fact that the concept of using SNS to treat patients with voiding dysfunction discussed first almost 50 years ago. AIM: The objectives of the study were to assess the effectiveness of SNS the short and long term for patients with overactive bladder (OAB) dysfunction and its relation to age, gender, and causes. PATIENTS AND METHODS: This is a clinical prospective study that involved 50 cases (32 females and 18 males) with OAB. It was carried out at Ibn Sina Hospital, and the neurosciences hospital in Baghdad/Iraq from April 2015 to April 2018. All the patients were assessed preoperatively and certain inclusion criteria were
... Show MoreTransforming the common normal distribution through the generated Kummer Beta model to the Kummer Beta Generalized Normal Distribution (KBGND) had been achieved. Then, estimating the distribution parameters and hazard function using the MLE method, and improving these estimations by employing the genetic algorithm. Simulation is used by assuming a number of models and different sample sizes. The main finding was that the common maximum likelihood (MLE) method is the best in estimating the parameters of the Kummer Beta Generalized Normal Distribution (KBGND) compared to the common maximum likelihood according to Mean Squares Error (MSE) and Mean squares Error Integral (IMSE) criteria in estimating the hazard function. While the pr
... Show MoreThis study aims to employ modern spatial simulation models to predict the future growth of Al-Najaf city for the year 2036 by studying the change in land use for the time period (1986-2016) because of its importance in shaping future policy for the planning process and decision-making process and ensuring a sustainable urban future, using Geographical information software programs and remote sensing (GIS, IDRISI Selva) as they are appropriate tools for exploring spatial temporal changes from the local level to the global scale. The application of the Markov chain model, which is a popular model that calculates the probability of future change based on the past, and the Cellular Automa