In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution
Objective: This study aimed to assessing new suggested technique of Physical Growth Curves (PGC) charts in
children under two years old of a non-probability sample.
Methodology: A non-probability sample of size (420) children under two years selected from 12 Primary
Health Care Centers in Diyala governorate during the period from 15th Nov. 2010 to 13th Mar. 2011
according to admix of a different properties together in one chart/or growth curve chart included in at least
weight, Height, and Head circumference.
Results: the results showed different properties that can be admix together in one chart/or growth curve
chart included in at least weight, Height, and Head circumference. And to overtake the problem of the norm
The formula of Ijarah and Ijarah ending with ownership is one of the investment formulas in Islamic banks, so this research has shed light on it in order to benefit from the experiences of the research sample banks, This research aims to find a reliable way for Iraqi Islamic banks, namely (leasing and leasing ending with ownership) in order to invest their money without usurious interests, The problem of the research emerges through the lack of awareness of the Iraqi Islamic banks to work with different Islamic financing formulas and their inability to invest their money through the adoption of their administrations for different formulas, including the leasing, and this is reflected in the decrease and fluctuation of its profits, Theref
... Show MoreThe study aimed to identify the awareness degree of teacher students in the department of Arabic language and their supervisors at Al-aqsa University for their future roles in the age of knowledge. To achieve this objective, descriptive- analytical approach was used. The instruments of this study were two questionnaires: first one consist of (20) item for teacher students, and the second consist of (27) item for educational supervisors which covered three roles: professional, technological, and humanitarian. The sample was (120) student selected randomly, and (39) supervisors of Arabic language. The result revealed that the mean of degree awareness of teacher students and their supervisors of future role are (3.857), (3.472) respectively
... Show MoreTraditionally, path selection within routing is formulated as a shortest path optimization problem. The objective function for optimization could be any one variety of parameters such as number of hops, delay, cost...etc. The problem of least cost delay constraint routing is studied in this paper since delay constraint is very common requirement of many multimedia applications and cost minimization captures the need to
distribute the network. So an iterative algorithm is proposed in this paper to solve this problem. It is appeared from the results of applying this algorithm that it gave the optimal path (optimal solution) from among multiple feasible paths (feasible solutions).
In this study, a fast block matching search algorithm based on blocks' descriptors and multilevel blocks filtering is introduced. The used descriptors are the mean and a set of centralized low order moments. Hierarchal filtering and MAE similarity measure were adopted to nominate the best similar blocks lay within the pool of neighbor blocks. As next step to blocks nomination the similarity of the mean and moments is used to classify the nominated blocks and put them in one of three sub-pools, each one represents certain nomination priority level (i.e., most, less & least level). The main reason of the introducing nomination and classification steps is a significant reduction in the number of matching instances of the pixels belong to the c
... Show MoreThe aim of this research is to compare traditional and modern methods to obtain the optimal solution using dynamic programming and intelligent algorithms to solve the problems of project management.
It shows the possible ways in which these problems can be addressed, drawing on a schedule of interrelated and sequential activities And clarifies the relationships between the activities to determine the beginning and end of each activity and determine the duration and cost of the total project and estimate the times used by each activity and determine the objectives sought by the project through planning, implementation and monitoring to maintain the budget assessed
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreArabic calligraphy has great importance in the printing designs that are often on the written character-based to perform functional goals and to achieve some of the aesthetic values in design work, has led major developments in the field of computer manufacturing and design software for the design and layout to increase to deal with the programmed character for the purposes of typesetting has confronted this Find the Arab character programmed for the purposes of typesetting for the detection of the most important design interventions that underwent the Arabic letter written to turn it into a programmed image intended for the purposes of the printing and typesetting has been addressed in the context of which the theoretical types of
... Show Moreantimicrobial solutions against Coliforms, E. coli O157: H7, yeasts and molds were evaluated by agar well diffusion method. Chitosan (CH) exhibited best antimicrobial activity against the treated microorganisms at concentration of (5%) with contact time for 6hrs at refrigeration temperature (4ÚC), zones of inhibition for (GA) and (CH) for each solution alone ranging from (0 to 10 mm), chitosan solution (CH) exhibited both antibacterial and antifungal activities, Gum Arabic washing solution showed significant antibacterial activity (P < 0.05) against the microorganisms at concentration (15%), without inhibitory effect against E. coli O157:H7 at concentration (10%), in the current study the results confirmed that (15%) (w/v) of GA and 5%
... Show More