The science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within average of 65 and MSE within average of 85, indicate that the proposed method has proven successful in its ability to efficiently embedding data.
This research aims to study the mechanism of application of international specification requirements (ISO 9001: 2015) at the Iraqi Center- Korean Vocational Training return to vocational training department at the Ministry of Labour and Social Affairs for the purpose of preparing and creating the center to get a certificate of conformity with the requirements of the standard (ISO 9001: 2015) that would elevate the level of performance and services provided in the respondent Center after it is identified and the study of the reality of the quality management system by identifying strengths and weaknesses in the system to diagnose the gap and find ways to address that gap, and adopted the researchers the case study method to conduc
... Show MoreThe coronavirus-pandemic has a major impact on women's-mental and physical-health. Polycystic-ovary-syndrome (PCOS) has a high-predisposition to many cardiometabolic-risk factors that increase susceptibility to severe complications of COVID-19 and also exhibit an increased likelihood of subfertility. The study includes the extent of the effect of COVID-19-virus on renin-levels, glutathione-s-transferase-activity and other biochemical parameters in PCOS-women. The study included 120 samples of ladies that involved: 80 PCOS-patients, and 40 healthy-ladies. Both main groups were divided into subgroups based on COVID-19 infected or not. Blood-samples were collected from PCOS-patients in Kamal-Al-Samara Hospital, at the period between Decembe
... Show MoreThis study was perform to defined the effect of fungus Metarhizium anisopliae Sorokin with concentrations 5x101, 5x103 and 5x105 spore/ ml and Actelic insecticide with concentration 0.001% in pupa stages of Callosobruchus maculatus in pupa ages of 24 and 120 hours the results of the study showed the following: the highest killing rate of treated pupa in age 120 hours 100% at concentration 105 spore/ ml. observation for distortions in the adult insects from the pupa that treated with fungal concentration like wings and abdominal distortion , the concentration of fungal effect on the number of eggs that production from adults and percentage of hatching.
In light of the increasing importance of interim financial statements they provided these lists of information that enables users of accounting information to make wise investment decisions and predict the company's activities in light of changes the updated rather than wait until the end of the year and accessing information provided by the annual financial statements. In light of this research has come to the most important set of conclusions the adoption of interim financial information has been audited by the external auditor to the availability of basic qualitative characteristics in the accounting information contained in the (appropriate and timely manner, reliability and comparability) and this in turn leads to the impact on reli
... Show MoreThe present paper is devoted to studying the imitation of some Quran phrases and words in the tale of "The Leprous Girl". The paper aims at identifying the common ground between the tale and some great stories related in the verses of the holy Quran, and comparing the original work with the present translation. First, we translated the tale from Russian into Arabic so as to be tackled in study, and then an identification of the commonalities between this tale and the Quran wording is made. It was found that texting is clear in the original text of the tale, hence the need for this paper. By studying the texts and phrases employed by the writer, we observe that the text is influenced by the Quranic stories whose effects have been reflecte
... Show MoreStudied the effect of foliar fertilizers Alaongrin results showed that spraying fertilizer Alaongrin and Fertilizers and Ministry of Agriculture and rack licorice extract every three weeks after thirty days from planting seedlings
This study aims to identify the degree of students of Princess Rahma University College owning e-learning skills related to MOODLE as they perceived in the of light Corona crisis. The researchers' questionnaire consisted of (37) items, distributed in three areas of e-learning skills related to the MOODLE on (147) students were chosen randomly. The results of the study showed that the degree of students 'possession of e-learning skills related to the MOODLE was significant. The results also revealed that there were statistically significant differences in the degree of students' possession of electronic learning skills related to the MOODLE due to sex in favor of females. Finally, there were no statistically significant differences in the
... Show MorePeople are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreRecently, the development and application of the hydrological models based on Geographical Information System (GIS) has increased around the world. One of the most important applications of GIS is mapping the Curve Number (CN) of a catchment. In this research, three softwares, such as an ArcView GIS 9.3 with ArcInfo, Arc Hydro Tool and Geospatial Hydrologic Modeling Extension (Hec-GeoHMS) model for ArcView GIS 9.3, were used to calculate CN of (19210 ha) Salt Creek watershed (SC) which is located in Osage County, Oklahoma, USA. Multi layers were combined and examined using the Environmental Systems Research Institute (ESRI) ArcMap 2009. These layers are soil layer (Soil Survey Geographic SSURGO), 30 m x 30 m resolution of Digital Elevati
... Show More