In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution
In this research, we have achieved the description of radionuclides that exist in the samples of Diyala river sediments as well as to measure the specific activities using gamma-ray spectroscopy. The eleven samples were collected among the length of Diyala River starting from Al- Rustumiya and finishing at the point where Diyala River meets Tigris which is in Baghdad. Gamma-ray spectrometry system consists of high-purity germanium detector (HpGe) with 50% efficiency and resolution (2.2 keV) for the energy (1332 keV) was used for standard source 60Co. Card spectrum analyzer connected to the PC type Pentium 4 was used to view the spectrum. And rates of the speci
... Show MoreThree cultivars of the crop Almash (Green Indian VC6089A10, Green Indian VC6173B1319, and Black Indian Gold Star) were tested in a field experiment during the 2022 growing season in Ramadi, Anbar province, to determine the impact of spraying levels of zinc (0, 25, and 50) mg Zn L-1 and manganese (0, 30, and 60) mg Mn L-1 on some growth characteristics. The experiment was conducted using a randomized complete block design (RCBD) with three replicates, with each treatment being tested in a separate split plot. The study found that there were statistically significant differences between zinc levels, with the level giving 50 mg Zn L-1
Abstract
The research aims to examine the effect of Hawkins' strategy on students in the fourth grade of primary school in the General Directorate of Education in Baghdad / Karkh 3 for the academic year (2020-2021). The research was limited to the topics of the Arabic language grammar book for the fourth grade of primary school. The researcher developed the research hypothesis, which is: that there is no statistically significant difference at the significance level (0.05) between the average scores of the experimental group students who study using the Hawkins strategy and the average scores of the control group students who study in the traditional method in the achievement test. The researcher set a number of
... Show MoreAlmost all thermal systems utilize some type of heat exchanger. In a lot of cases, evaporators are important for systems like organic Rankine cycle systems. Evaporators give a share in a large portion of the capital cost, and their cost is significantly attached to their size or transfer area. Open-cell metal foams with high porosity are taken into consideration to enhance thermal performance without increase the size of heat exchangers. Numerous researchers have tried to find a representation of the temperature distribution closer to reality due to the different properties between the liquid and solid phases. Evaporation heat transfer in an annular pipe of double pipe heat exchanger (DPHEX) filled with cooper foam is investigated numerical
... Show MoreThis study deals with the concepts of Colonialism and Civilization in Aimé Cesaire’s A Tempest. The concern of this study is to discuss how postcolonial writers are continually re-writing the Western canonical works as a reaction to the European cultural hegemony. The Western representations of the black are products of specific moments and developments in history and culture. A Tempest reflects a certain historical moment in the decolonization process.
A Tempest is analysed to reveal the counter literary strategy used by Aimé Cesaire, and to disclose the reasons why re-writing and writing back are considered as vital and inescapable tasks. Shakespeare’s The Tempest, which deals with the
... Show MoreSteganography is a technique to hide a secret message within a different multimedia carrier so that the secret message cannot be identified. The goals of steganography techniques include improvements in imperceptibility, information hiding, capacity, security, and robustness. In spite of numerous secure methodologies that have been introduced, there are ongoing attempts to develop these techniques to make them more secure and robust. This paper introduces a color image steganographic method based on a secret map, namely 3-D cat. The proposed method aims to embed data using a secure structure of chaotic steganography, ensuring better security. Rather than using the complete image for data hiding, the selection of
... Show More