In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .
The present study is a linguistic study of comment clauses in the American Series „Friends‟ .Comment clauses refer to those clauses which comment on the content of the main clause or the attitude of the speaker towards the way of speaking .The problem of this study is to answer the following questions ; what types of comment clauses can be used in the face- to –face conversations , for what functions these comment clauses could be used , and how these comment clauses are used by the participants of these conversations . This study is a qualitative one . The study aims to investigate the types of comment clauses used in the American Series “Friends‟. The study also aims to investigate the pragmatic functions of these comment clause
... Show MoreAPDBN Rashid, 7th International Conference on Multidisciplinary Sciences (7th ICOMUS), 2021
BN Rashid…, Special Education, 2022
A rapid and sensitive method for the determination of amoxicillin trihydrate (AMXT) based on the diazo-coupling reaction was studied. Sulphanilic acid diazotizes with nitrite ion in acidic medium to produce a water soluble, colorless diazonium ion, which subsequently coupled with AMXT to form a colored azo dye in the alkaline medium, having maximum absorption at 455 nm. The calibration graph showed that Beer's law is obeyed over the concentration range of 0.3 – 30.0 μg/mL of AMXT, with the detection limit of 0.15 μg/mL and molar absorptivity was 2.3 × 104 L/mol.cm. The accuracy and the precision were acceptable depending upon the values of error percentage and relative standard deviation. The influence of common interfer
... Show MoreA Classical allusion refers to myths in ancient Roman and Greek works of literature. Christopher Marlowe (1564-1593), utilized mythological allusions in The Tragical History of Doctor Faustus (1588- 1592) to create a connection between ideas. Dr. Faustus wanted the infinite. He sold his soul to the devil to gain it. He rejected theology and embraced magic and mythology that epitomized pseudo-divinity. Classical mythology invites moral and theological discussion. It intensifies the aesthetic purpose and the spiritual evaluation of Dr. Faustus‟s ambition
The study is done in the period between (February 20 and October 20) by using ten adult quail Coturnix coturnix (Linnaeus, 1758). The sections are preparing by paraffin method then stain in Harris haematoxylin-eosin. The histological aspects of spinal cord in quail (Coturnix coturnix) the white matter is in the outer part, while the gray matter is arranged in from of X represents its internal part, the dorsal region is called the dorsal horns while the ventral region is called the ventral horns and the central canal cavity, the spinal cord areas appeared as follows: The medial column, column of von Lenhossek, lateral column, dorsal magnocellular column and marginal paragriseal, columns are also called Hoffmann’s nuclei.
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More