Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.
This paper seeks to study the link between the fundamentalist evidence based on the observance of governance and interests and the ranks of the three legitimate purposes (necessary, need and detailed). The researcher followed the descriptive-analytical approach. The study reached important results, including that the measurement relates to the three ranks, but predominantly attached to measure the meaning of the need and the need, and the measurement of the semi-formal and semi-predominance improvement. Reclamation is considered by the majority of scholars to be authentic if it is related to the necessity and the need, and that it is not acceptable to improve only by a witness who recommends it. The excuses relate to Hajji and Tahini, no
... Show MoreThe main aim of this paper is to study how the different estimators of the two unknown parameters (shape and scale parameter) of a generalized exponential distribution behave for different sample sizes and for different parameter values. In particular,
. Maximum Likelihood, Percentile and Ordinary Least Square estimators had been implemented for different sample sizes (small, medium, and large) and assumed several contrasts initial values for the two parameters. Two indicators of performance Mean Square Error and Mean Percentile Error were used and the comparisons were carried out between different methods of estimation by using monte carlo simulation technique .. It was obse
... Show MoreThe Assignment model is a mathematical model that aims to express a real problem facing factories and companies which is characterized by the guarantee of its activity in order to make the appropriate decision to get the best allocation of machines or jobs or workers on machines in order to increase efficiency or profits to the highest possible level or reduce costs or time To the extent possible, and in this research has been using the method of labeling to solve the problem of the fuzzy assignment of real data has been approved by the tire factory Diwaniya, where the data included two factors are the factors of efficiency and cost, and was solved manually by a number of iterations until reaching the optimization solution,
... Show MoreThe study aims to reveal the degree of application of the alternative evaluation strategy in social studies in public education in the Kingdom of Saudi Arabia. It also aims to identify the opinions of experts on how to implement this. The study adopted the mixed methodology, which represented in the descriptive-analytical method, and qualitative methods through the grounded theory. The study used two tools namely: a questionnaire for assessments of social studies teachers and semi-structured interview questions. The results of the study showed a medium degree of appreciation for the application of alternative evaluation strategies by social studies teachers in general education with an average of (2.28). The results also showed that ther
... Show MoreHigh frequencies of multidrug resistant organisms were observed worldwide in intensive care units which is a warning as to use the only few effective antimicrobials wisely to reduce selective pressure on sensitive strains.
The aim of the current study is to asses the compliance of the currently followed antibiotic prescribing pattern in the intensive care unit in an Iraqi hospital with the international guidelines.A cross-sectional study was done in the intensive care unit (ICU) of the Surgical Specialties Hospital, Medical City in Bagdad from the 30th of November 2011 to the 5th of May 2012.Patients were followed until they were discharged or died to see any change in condition, response to drugs, devices u
... Show MoreVerbal Antonyms: A research in the relationship in meaning Between the words in Arabic language
Abstract:
Bajila regarded as descending from Anmar Ibn Nizar. Al-Masudi accepts
Bajila and Khath”am as being of Nizar, and asserts that it was only out of the
enmity that they were said to be from the Yemen.
Al-Ya”qubi tries to harmonize this by assuming that Anmar married a
women of the Yemen and that his sons Bajila and Khath”am are thus
connected to the people of this region only through their mothers line.
Bajila embraced Islam in the period of the prophet. Omar 1 forced this
tribe to go to Iraq instead of Al-_Sham, and gave them the quarter of Al- Saw
ad. Then they prohibited from that quarter by given money as reward that
made them against omar1.
This tribe assisted the forth rightly guided ca
Background: Prolonged use of low-dose estrogen ''20 micrograms or less" Combined oral contraceptive pill (that have estrogen and progesterone steroid hormone) had an effect on bone turnover .Bone mineral density is used in clinical medicine as an indirect indicator of osteoporosis and fracture risk. The aim of the study: The aim of this study was to investigate the effect of low dose oral contraceptive pill on the cortical thickness (in millimeter) and bone mineral density at the mandibular cortex of mental and gonial regions in Hounsfield unit(HU) using spiral computed tomography. Material and method: This prospective study was conducted on computed tomographic image of 100 women aged between (20-40) years .The collected sample includes
... Show MoreThe intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents. But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..
In this research LSB technique has been used
... Show More