In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .
Background: The prevalence of thyroid nodules rise with age and different data available about the risks of thyroid surgery in old age people. In general, old age could be a predictor of perioperative mortality and morbidity. The aim of this study is to prove if there is increased risk accompanying thyroidectomy in elderly patients.
Subjects and Methods: Prospective study of one surgeon of study sample undergoing thyroid surgery at Al-Kindy teaching hospital and Saint Raphael hospital .This study was including two groups; group (A) involved patients 65 years and older, group (B) involved patients below 65 years old who were subjected to thyroidectomy. Taking in consideration hist
... Show MoreKE Sharquie, AA Noaimi, MS Younis, BS Al-Sultani, Journal of Cosmetics, Dermatological Sciences and Applications, 2014 - Cited by 5
The limitations of wireless sensor nodes are power, computational capabilities, and memory. This paper suggests a method to reduce the power consumption by a sensor node. This work is based on the analogy of the routing problem to distribute an electrical field in a physical media with a given density of charges. From this analogy a set of partial differential equations (Poisson's equation) is obtained. A finite difference method is utilized to solve this set numerically. Then a parallel implementation is presented. The parallel implementation is based on domain decomposition, where the original calculation domain is decomposed into several blocks, each of which given to a processing element. All nodes then execute computations in parall
... Show MoreBack ground : Fever is a common medical problem in children. parents have been shown unrealistic fears of harmful effects of fever in their children. Resulting in inappropriate management of fever in their children. Objective: the objective of this study was to survey parents about their knowledge andattitude concerning fever in their children. Methods : The study involved random selection of parents who brought their febrile children to emergency department or out-patient clinics of five teaching and non teaching hospitals in Baghdad from first of October to end of December 2002. Parents of 400 febrile children were interviewed using a standard questionnaire to obtain sociodemographic information and current knowledge of fever. Results: Ap
... Show MoreAbstract: Consumer protection in electronic contracts is of great importance in Iraqi law, as there are detailed legislations that enhance consumer rights and provide mechanisms for compensation when necessary. In Iraq, the Consumer Protection Law of 2010 regulates these rights and ensures the availability of sufficient and clear information to consumers.
Melatonin, a hormone synthesized mainly by the pineal gland, has been found in extra-pineal organs as well. It’s known as an organizer of circadian rhythms and more recently as an anti-oxidant. In addition to its role in maintaining immunity, pathophysiology of cardiovascular and neurological diseases, and as an anti-cancer agent, evidence has demonstrated that melatonin exerts a positive impact on male and female fertility primarily through oxygen scavenging effects. In In Vitro Fertilization (IVF) programs, supplementation of melatonin may be associated with better outcomes in terms of sperm quality, oocyte quality, embryo quality and pregnancy rates. This review summarizes various actions of melatonin on the body focusing on ma
... Show MoreOne of the main aims of Metrical Phonology Theory (MTT) is to provide the stress of poetry on the syllable, the foot, and the phonological word levels. Analyzing poetry embodies one of the most prominent and controversial metrical issues as the subsumed number and types of syllables, feet, and meters are balanced compared to other literary texts. The MTT saw the light during the late seventies (1975) and (1977) by Liberman and Prince, who produced it as part of non-linear phonology. Its roots originated in prosody, which studies poetic meter and versification. The basis of the metrical analysis is the prosodic analysis developed in London by Firth and his students in 1950. This study aims to identify the values of five metri
... Show MoreSex chromatin (SC) is defined as inactive X chromosome in the female somatic cells, it condensed as heterochromatic at interphase of the nucleus and appears like nuclear satellite projection, and only female cells contain SC in mammals. Different ages of cocks: immature (8,16 weeks old), growing (24 weeks old) and production age (32,48 weeks old) , were studied to detect the sex chromatin (SC) with it's various shapes :Sessile nodule(SS), Drum stick(DS), Tear drop(TD) and Club shape(CS) in the blood lymphocytes of blood smears prepared from WBCs of 45 New Hampshire(NH) strain cocks. Also SC measurements were detected which include: vertical (V) and horizontal (H) axes, SC area (SCA), nuclear area (NA), and the
... Show More