In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .
The Civil Rights era has been an era of struggle for the African American in the
Unites states. Thus, many writers devoted their writing to reflect the racism and
discrimination that many have suffered from, among them is Ralph Ellison.
Ralph Ellison is a 20th century African-American writer and scholar best known for
his renowned, award-winning novel Invisible Man. He illustrates the powerful
social and political forces that conspire to keep black Americans in their place,
denying them the right to life, liberty, and the pursuit of happiness guaranteed to all
Americans. Invisible Man is a 1952 novel that addresses many of the social and intellectual
issues facing African-Americans in the twentieth century. It exa
The novel was generally distinguished from other literary arts in its connection with the living reality as an imaginative practice that relies on political, economic, social, intellectual and cultural references and as a crucial tool in reading cultural references and dive deep into reality. As every novelist has a vision to embody this reality. As every novelist has a vision to embody this reality. The novel of ("Exceeded border by Hammed Al-Kafa’i) is a considered a fertile field for presenting social issues in their apparent structure and revealing the cultural patterns behind them which lies in its deep structure. The novel here moves its characters in its imaginary world in a way that it becomes more capable of adaptation and crysta
... Show MoreFlower samples of Calendula officinalis were collected from the gardens of the college of Pharmacy in Baghdad city to examine their antibacterial activity .The effect of ethanol crude extract of petals and reproductive parts of flowers in different concentrations were obtained and bioassayed in vitro for its bioactivity to inhibit the growth of eight types of bacteria .The extracts of petals part were clearly superior for all bacteria especially the bacteria Pseudomonas aeruginosa (inhibition zone was 25mm in the concentration 100mg/ml) from gram negative bacteria, and Staphylococcus aureus (inhibition zone was 14mm in the concentration 50mg/ml) from gram positive bacteria, whi
... Show MoreOut of 180 children, 60 (33.3%) have Amoebiasis infection as diagnosed by direct wet smear and Saturated Salt Solution (SSS). SSS method is more significant (P=0.001) in diagnosis of the disease. Number of children infected with Amoebiasis infection is higher in infants aged 1-6 months, but without any significant difference to ages 6-12 or 12-18 months. In contrast, infants aged 18-24 months are significantly differant (P=0.01) as the infection rate is 16.6%. Gender also is seen to be reduced in significance (P= 0.001) for females aged 18-24 months. Blood profile of the involved infants has shown a significant variation (P=0. 01) for all blood profile parameters (RBC (P=0.05), WBC (P=0.001), Lymphocytes (P=0.05), Granulated WBC (P=0.05),
... Show MoreThe recognition of handwritten numerals has many applications in automatic identification and cognition. This research contains three experimented scenarios to recognize the handwritten English (i.e. Arabic) numerals. In the first scenario the bilinear interpolation of the image is used, while in the second scenario and after the bilinear interpolation is being applied, the Sobel operators are applied on the resulted interpolated image. In the third scenario which represents the last one, the effect of normalization of image dimensions is tested. 550 images of handwritten numerals were tested. Three types of tests were conducted for each scenario namely: trained-set test, not-trained-set test and comprehensive-set test. Depending on the
... Show MoreThe aim of this study was to evaluate the anti mitotic activity of ether extract prepared from Datura stramoium plant on cancer cells. Recently oncology studies are directed toward substances which act somehow to induce apoptosis or to prevent abnormal dividing of cell, that may provide therapeutic strategies for the treatment of cancer. Thus, many research on various types of plants such as fruits, vegetables, other editable plants and toxic plants have been done in vitro and in vivo. But, few studies on Datura plant were occurred and there was no previous study dealing with its effect on proliferative activity of cancer cells. In current study, two types of common malignant tumor were tested in vitro. These were mamm
... Show MoreThe organization and coordination of any communication is based on the system of turn-taking which refers to the process by which a participant in a conversation takes the role of speaker. The progression of any conversation is achieved by the change of roles between speaker and hearer which, in its turn, represents the heart of the turn-taking system. The turn-taking system is not a random process but it is a highly organized process governed by a set of rules. Thus, this system has certain features and rules which exist in any English communicative process. These rules, if applied by speakers, help to achieve successful exchange of turns in any conversation. This paper attempts to present full exposition of the concepts of conversation
... Show MoreThis study included a survey and review of the scientific names of the marsh insects (aquatic and surrounding it) for the purpose of unifying and updating the database.
The survey reveals 109 species under 77 genera that belong to 32 families and 7 orders as follow: Coleoptera (44 species), Diptera (7 species) Ephemeroptera (2 species), Hemiptera (14 species), Hymenoptera (11 species), Lepidoptera (2 species) and Odonata with 29 species.
Information of specimens' collection for each species, synonyms and geographical distribution were provided.
Objective: The study deafs with nursing performance in the surgical wards in general hospital at
Baghdad city.
Methodology : A descriptive evaluation design using, observational method was carried out. Non
probability (purposive) sample of (151) nurses was selected for the study and comprised all nurses who
worked in general surgical wards in the four health sectors( Rusaffa , Al-Karkh, Al-Yarmok, Medical
city health sector) at time of collecting the data. A check list questionnaire was constructed by the
researcher for the purpose of the study; it is composed of (2) major parts, part (I) is concerned with
socio-demographic data and the second part is composed of two minor parts thev concerned with
availability of
In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv
... Show More