In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .
Virtual platforms are online classes used in teaching and learning EFL that let both teachers and students connect, communicate and cooperate online in real time. Learners get access to educational possibilities at home easily. Virtual classes can be conducted using a variety of techniques, including video conferencing, Google Meet, Zoom, conversations, reactions, and screen sharing. Users can access these programs on a range of gadgets, including laptops, tablets, and smartphones. The COVID-19 coronavirus pandemic affected all educational institutions, including schools, colleges, and universities. Our Iraqi educational institutions have been switched to use virtual platforms in this pandemic, much as all other foreign institutions
... Show MoreIn recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of
researchers and product developers due to its robust mathematical structure and
highest security compared to other existing algorithms like RSA. It is found to give
an increased security compared to RSA for the same key-size or same security as
RSA with less key size. In this paper a new approach is proposed for encrypting
digital image using the arithmetic of elliptic curve algebra. The proposed approach
produced a new mask for encrypt the digital image by use a new convolution
processes based on ECC algebra operations and work as symmetric cryptographic
system instead of asymmetric system. A new approach combined both compression
The study was carried out for the period March 2007 -
January 2008 , in order to describe the status of the environmental sanitation and the prevalence of rodents infestation in nine quarters in Baghdad city . The results showed that the PI varied between 40 -
100% in garbage accumulation places and between 33.3 - 100% in the
other sites (houses , shops , bakeries and book shops) . It was noticed that, no rodents control activities were carried out from 2003 till now because of the unsuitable conditions a especially in Baghdad city . The level of ES was bad in general according to three degrees of evaluation (weak , mid and good)
Clinicians and investigators consider the normal range of bowel habit and frequency as between 3 to 21 motions per week. Stool frequency outside the normal range may be unusual but may not be abnormal in the sense of a disease, and according to the consistency, the normal stool ranges from porridge like to hard and pellety.
Objectives: To establish a basic data about the bowel habits (consistency and frequency) in a sample of healthy Iraqi population; in addition to learn about their definition of constipation and diarrhea.
Methods: Prospective study from Jan 2000- Jun 2000 at Al-Yarmouk teaching hospital, Baghdad. Questionnaires were distributed to 950 healthy persons of different age group .The questionnaire included: Detailed hi
The study aimed to identify the self- compassion of the students as well as to identify the differences in the self- compassion according to the variables: sex - the academic specialization - Study level, the sample of the study of (200) students distributed equally by sex (male - female) Specialization (Scientific - Human) compassion. The results showed that there were no differences in the self- compassion according to the variables: gender, academic specialization, and Study level. In light of these results, the researcher Number of the recommendations and proposals
Excessive torque and drag can be critical limitation during drilling highly deviated oil wells. Using the modeling is regarded as an invaluable process to assist in well planning and to predict and prevent drilling problems. Identify which problems lead to excessive torque and drag to prevent cost losses and equipment damage. Proper modeling data is highly important for knowing and prediction hole problems may occur due to torque and drag and select the best method to avoid these problems related to well bore and drill string. In this study, Torque and drag well plan program from landmark worldwide programming group (Halliburton Company) used to identify hole problems.one deviated well in Zubair oil fields named, ZB-250 selected for anal
... Show MoreThis study is concerned with a survey of seven species belonging to seven genera under two families and two orders found in some different areas of the Tigris River, especially since these areas have not been surveyed for a long time, and an attempt to identify the existing species at the present time after the recent water scarcity of the Tigris and Euphrates rivers and all water bodies interior of Iraq and the impact of this scarcity on the fish diversity found in some areas of the Tigris River in Baghdad.
Orthodontic treatment has two major problems: being lengthy and costly procedure. The present study was designed to evaluate the clinical efficacy of locally injected vitamin D3 Keywords: Orthodontic, Calcitriol, Local injection, OTM (calcitriol) in accelerating orthodontic teeth movement (OTM) and reducing treatment time and cost in humans. The study was performed on 15 Iraqi adult orthodontic patients within the age range 17-28 years, they are randomly allocated into three groups, each of five patients and treated with either 15 pg, 25 pg, or 40 pg/0.2ml calcitriol diluted with 10% dimethylsulfoxide (DMSO). The maxillary arch of every patient was divided into control (right) and experimental (left) sides. In addition to force application,
... Show More