In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .
The current work aims to evaluate the association between genetic mutations in thymidylate synthetase (
The division partitioning technique has been used to analyze the four electron systems into six-pairs electronic wave functions for ( for the Beryllium atom in its excited state (1s2 2s 3s ) and like ions ( B+1 ,C+2 ) using Hartree-Fock wave functions . The aim of this work is to study atomic scattering form factor f(s) for and nuclear magnetic shielding constant. The results are obtained numerically by using the computer software (Mathcad).
لمعرفة مدى تأثير تمرينات مهارية وفق تقنية تركيز للتفكير الجاني على الدقة الحركة وتعلم هجمة الإيقاف بالغطس للطلاب في سلاح الشيش استخدمت الباحثتان المنهج التجريبي على عينة من طلاب المرحلة الثالثة بكلية التربية البدنية وعلوم الرياضة –جامعة ديالى والتي بلغت (30) طالباً موزعين على مجموعتين التجريبية والضابطة وبعد إكمال اجراءات البحث وتطبيق الاختبارات القبلية وتنفيذ التمرينات والاختبار البعدي ومعالجة الب
... Show Morethis paper consists of three sections, Section one deals with the most important difficulties and characteristics of English subordinate clauses whereas section two tackles the difficulties faced by the Iraqi EFL students at the third year in the Department of English, College of languages, University of Baghdad in recognizing and producing the subordinate clauses submitting them to a test consisting of two questions (recognition and production). Finally, some pedagogical recommendation of the findings can be found in section four.
Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show MoreBackground: Vitamin D deficiency/ insufficiency is common in different age groups in both genders especially among pregnant women and neonates where it is associated with several adverse outcomes including preeclampsia and preterm delivery.
Objectives: To assess the extent of vitamin D deficiency/ insufficiency among mothers and their neonates and some factors related to it and identify some adverse outcomes of the deficiency/ insufficiency on neonates (preterm birth and low birth weight).
Subject and Methods: A cross-sectional study was conducted on 88 Iraqi pregnant women and neonates admitted to “Al-Elwiya teaching hospital for maternity” in Baghdad- Al
... Show MoreThe bile salt hydrolase gene (bshA), encoding bile salt hydrolase enzyme (EC 3.5.1.24) from probiotic isolate Lactobacillus acidophilus Ar strain which is responsible for assimilation cholesterol were studied in the present work. About 801 bp in length DNA fragment of Lb. acidophilus Ar strain was amplified by PCR techniques. Two restriction sites (PstI/SacI) were added to each end of that fragment for manipulation of DNA during cloning. Amplified fragment inserted into pJET1.2\blunt end vector and pMG36e vector respectively. pJET1.2\blunt end vector is overexpression plasmid for E. coli MC1022, and pMG36e vector is a shuttle vector which is able to replicate in both E. coli and lactic acid bacteria. The resulted constructs were named as pJ
... Show More