The science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within average of 65 and MSE within average of 85, indicate that the proposed method has proven successful in its ability to efficiently embedding data.
One of topics that occupied alarge area in Iraqi society at the moment is the issue( of tribal separation and its relation to the organization of the community ) so we see in the civilizations and heritage of each community aset of provisions and laws that take the form of status customary or religious it is indicative of the great interest in Iraqi society in cotrolling the behavior of individuals to comply with values and social laws and become their behavior is consistent with the behavior of the total and adhere to the social values and be productive individuals within the subject and this can only be achieved from the social co
... Show MoreThis study was for searching for Cholera Bacteria serotype which causes epidemiology Cholera in the 2007 in a fast method which contains (Rapid Visual Test) (Crystal V.C.) which was used for the first time in Iraq to diagnosis of Cholera Bacteria & compared with the traditional bacteriology method. The Cholera disease is one of the most dangerous epidemiological diseases which lead to death with a percentage of (50 – 70) % in the severe cases for untreated patients . For this purpose, 100 samples of stool from the patients from a (13) hospitals in Baghdad Governorate in the period from August to the end of December. The Cholera was diagnosis in two methods, 1st method was the fast method using the nitrocellulose which is coated with anti-
... Show MoreTwo field experiments were performed to study the response of two species , Nigella sativa L. and Nigella arvensis L. within different sowing dates at spring and autumn seasons which included 1st and 20th March, 10th April and 1st May for spring season, while the sowing dates for the autumn season were, 2nd November, 21st November, 11th December, 31stDecember and 20thJanuary. Both experiments conducted according to the Completely Randomized Block Design (CRBD) within three replications at hallabja/Kurdistan Region, located [35°12'48.7"N; 45°57'34.4"
... Show MoreVorwort:
Die Übersetzung gilt in der Vergangenheit als Brücke zwischen verschiedenen Gesellschaften. Sie spielt eine große Rolle im Bereich Kulturaustausch der Länder. Die Araber haben das früh betrachtet, und die Übersetzung als Wissenschaft wird eine der wichtigsten Lehren. Viele griechische Wissenschaften waren durch Übersetzung in den arabischen Ländern bekannt.
In dieser Forschung findet man einen Überblick über die Wichtigkeit der Sprichwörterübersetzung und welche Rolle spielt diese Übersetzung im Z
... Show MoreThis research sheds light on the morphological structure of nouns and verbs in the novel "ASTONISHMENT" by the novelist Aharon Applefield by analysing selected models from the novel in a morphological analysis in order to identify the most important morphological features of this structure according to a statistical analytical approach.
The morphological structure is the main pillar of the linguistic structure of the literary text. Morphology is the science that studies the word, by which its structure and original letters are known, and the change that has occurred to it. The aesthetics of the fictional text is reflected in this structure, through which the writer conveys his ideas and narrations to the reader. The research
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreDifferent methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard versi
... Show MoreIn this paper, the proposes secure system to improving security of ID card and passports is by generating cubic spline co-occurrence code (CCO code) for each ID card. The authentication part, begins passing ID card through the checkpoint then the checkpoint will check the information of card or passport by also extracting features in order to generate the cubic spline co-occurrence code (CCO code), finally comparison is made between extracted CCO code at the checkpoint and CCO code that has been printed on ID card or passport (type of fraud like change personal picture or fraud it’s information). Several tests were conducted to evaluate the performance of the proposed security system. Furthermore, the experiment results reveal that the
... Show MoreDue to their high nutritional value, richness in carbohydrates and good source of protein, legumes are considered essential for human diet. Legumes flours were used as fermentable material for lactic acid production. Hence, previously isolated lactobacilli strains were used in this study. The strains showed strong microbial growth and their survival in glucose-containing MRS medium and were described using a modified Gompertz equation. Lactobacilli exhibited the shortest latency phase in MRS-glucose medium. While the highest lactic acid produced was 15.40g/l by Lpb. pentosus U1 isolate after 48hours. Furthermore, these strains were evaluated in flours samples for acidification capacity. The results showed a decrease
... Show MoreA simple technique is proposed in this paper for estimating the coefficient of permeability of an unsaturated soil based on physical properties of soils that include grain size analysis, degree of saturation or water content, and porosity of the soil. The proposed method requires the soil-water characteristic curve for the prediction of the coefficient of permeability as most of the conventional methods. A procedure is proposed to define the hydraulic conductivity function from the soil water characteristic curve which is measured by the filter paper method. Fitting methods are applied through the program (SoilVision), after indentifying the basic properties of the soil such as Attereberg limits, specific gravity, void ratio, porosity, d
... Show More