In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .
Owing to the energy crisis and pollution problems of today, investigations have concentrated on
decreasing fuel consumption and on lowering the concentration of toxic components in combustion
products by using non-petroleum, renewable, sustainable and non-polluting fuels. While conventional energy sources such as natural gas, oil and coal are non-renewable, alcohol can be coupled to renewable and sustainable energy sources.
In this study, the combustion characteristics of diesel fuel and methanol blends were compared.
The tests were performed at steady state conditions in a four-cylinder DI diesel engine at full load at
1500-rpm engine speed. The experimental results showed that diesel methanol blends provided
12.7% inc
This paper aims to shed light on adaptive reuse in traditional architecture (TA) in Erbil, Iraq.
An inductive approach and qualitative method were used in this study. The inductive research approach was used because there was no clear image of adaptive reuse in traditional cafés (TCs) in Erbil. Besides, there are no studies of TCs in Erbil particularly. Thus, there is a lack of knowledge about what adaptations took place in TCs in Erbil. The qualitative method extracted themes and issues from case studies of four TCs in Erbil citadel'
Diabetic retinopathy is an eye disease in diabetic patients due to damage to the small blood vessels in the retina due to high and low blood sugar levels. Accurate detection and classification of Diabetic Retinopathy is an important task in computer-aided diagnosis, especially when planning for diabetic retinopathy surgery. Therefore, this study aims to design an automated model based on deep learning, which helps ophthalmologists detect and classify diabetic retinopathy severity through fundus images. In this work, a deep convolutional neural network (CNN) with transfer learning and fine tunes has been proposed by using pre-trained networks known as Residual Network-50 (ResNet-50). The overall framework of the proposed
... Show MoreThe research article deals with the process of building or rebuilding the state in Iraq after 2003 in its various dimensions, in light of the vision and foundational procedures that were developed and supervised by the United States in cooperation with the new leaders of Iraq based on the mechanism of sectarianethnic representation, and diagnosing the imbalances that arose out of that vision and the accompanying procedures, which led to the emergence of new variables in the political process, especially in the post-ISIS* phase, which produced important challenges to the political system and the Iraqi state. The political dynamics and balances emerging after ISIS* represented at the same time opportunities and risks in the process of
... Show MoreBackground: Insulin resistance is present in 50% or more of patients with primary hypothyroidism. Metformin can decrease TSH levels in these patients by a complex matter, this can be of great help in clinical practice.
Objective: This study was designed to evaluate the effect of metformin in reducing TSH levels in patients with primary hypothyroidism.
Methods: Hundred patients with primary hypothyroidism, 82 females, 18 males were included in this study, everyone was followed up for two months after adding metformin 850 mg twice daily in addition to thyroxin.
Results: 36 patients (36%) have a normal baseline TSH and no change after 2 months, 64 pa
... Show MoreInjana Formation is the most extended geological formation in Salahaddin Governorate/ Iraq. About 10% of the studied area is covered by the outcrops of the formation as a recharge area. The formation is a subsurface within the unsaturated zone in 5% of the total studied area, while it exists within the saturated zone in about 85%; it is a major confined groundwater aquifer. Therefore, the hydrogeological system of the layers needs to be re-evaluated to describe the successions of aquifers and confining layers and their relation with each other.
The lithology, depths, water table, saturated thickness, hydraulic characteristics of the aquifers, and the lateral and vertical variations of these characteristics were adopted to classif
... Show MoreFraxinus ornus L. is considered as a special species that is frequently planted as a decorative tree in most of the country. The cross-sections of the root and stem are circular in shape and in the secondary growth stage, the vascular tissue in the root and stem consists of secondary xylem in radial rows and the type of vessels in the xylem are ring pours wood. Epidermal cells of leaves undulate on the upper and lower side, hairs are uniseriate and unicellular and the stomata appeared in the abaxial surface only is anomocytic type. The vertical-section of blade leaf includes upper epidermis and lower epidermis followed by the palisade layer and spongy layers. The cross-section of petiole horseshoe shape and the vascular bundles are cover
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreThe present work provides a list of all amphibians and reptiles recorded from Iraq up to 2014. It includes 115 species (105 species of reptiles and 10 species of amphibians) dating back to 25 families (20 families of reptiles and 5 families of amphibians). Conservation status of each species was mentioned.