In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the Lyapunov exponents, fractal dimension, and bifurcation diagrams. Furthermore, an algorithm is suggested to generate a random binary key, serving as the controller for the embedding process. And the randomness of the generated key was checked. Moreover, this paper introduces a technique that utilizes the generated random key to govern both the embedding process in the spatial domain and the frequency domain. The results of this study are promising and its potential applications can be extended to various fields that require discreet communication and robust data protection
The results of the current study showed that the liver of H. javanicus appeared as large lobulated organ divided into six distinct lobes, that filled the cranial region and little extended to the middle region of abdominal cavity. On the other hand, liver of S. carolinensis laid against the diaphragm, occupied the cranial region of the abdominal cavity and consisted of five lobes. The liver is surrounded with a thin capsule of dense regular collagenous connective tissue and few numbers of smooth muscles fibers can be seen in the capsule that covered the squirrel liver. The liver parenchyma divided into a large number of interconnected hepatic lobules marked only by the abundant amount of connective tissue bordered the triads, and within the
... Show MoreTwenty five vaginal swabs from outpatients' healthy women were collected from Kamal Al-Samarai Hospital, Baghdad, to isolate and identify of Lactobacillus acidophilus. Three isolates were diagnosed as L. acidophilus which represents 15% of the total number of lactic acid bacterial (LAB) isolates; other LAB types represent 65% (20 isolates).The ability of L. acidophilus to produce surlactin was detected after measuring its biological activity to inhibit the adhesion of biofilm formed by Pseudomonas aeruginosa to surfaces using test tube method. It was found that all isolates were able to produce surlactin but the activity of surlactin was varying in each isolate. Surlactin produced by isolates 1 and 13 was the most effective. Biological appl
... Show More
Abstract
Indeed, being busy with the understanding of religion is the best sort of worship that the almighty God has given each period of time a number of scholars and wise men. They receive what has been passed down to them from their great ancestors, and those who are willing to learn will learn, their students preserve their knowledge through teaching and writing. Thus, the scholars were pioneers in this field due to the value and importance of their knowledge. They have strived in learning, explaining, and writing new subjects.
One of those scholars is sheikh (Abdulrahman Al-Penjweni) who passed away 1319 AH in one of the villages of the city of Sulaimani in Iraq. He was one of the wisest scholars, a br
... Show MoreThe Field Programmable Gate Array (FPGA) approach is the most recent category, which takes the place in the implementation of most of the Digital Signal Processing (DSP) applications. It had proved the capability to handle such problems and supports all the necessary needs like scalability, speed, size, cost, and efficiency.
In this paper a new proposed circuit design is implemented for the evaluation of the coefficients of the two-dimensional Wavelet Transform (WT) and Wavelet Packet Transform (WPT) using FPGA is provided.
In this implementation the evaluations of the WT & WPT coefficients are depending upon filter tree decomposition using the 2-D discrete convolution algorithm. This implementation w
... Show MoreThe aim of the research is to identify the effectiveness of the educational pillars strategy based on Vygotsky's theory in mathematical achievement and information processing of first-grade intermediate students. In pursuit of the research objectives, the experimental method was used, and the quasi-experimental design was used for two equivalent groups, one control group taught traditionally and the other experi-mental taught according to the educational pillars strategy. The research sample consisted of (66) female students from the first intermediate grade, who were inten-tionally chosen after ensuring their equivalence, taking into account several factors, most notably chronological age and their level of mathematics, and they we
... Show MoreThe research aims at shedding light on the impact of information technology in reducing tax evasion in the General Authority for Taxation. In order to achieve this, the research relied on the analysis of its variables as a main tool for collecting data and information. The results showed that there is a positive and positive effect of information technology on tax evasion. The impact of information technology on increasing tax revenues and reducing the phenomenon of tax evasion In the performance of the research sample, the research sought to highlight the importance of tax information technology through its data and information to the tax administration for the purpose of completing the process Taxpayers for persons subject to income ta
... Show MoreThe research aims at identifying the importance of scientific research for researchers and in creating new knowledge، development and utilization of mental and cognitive energies and developed them with the ability to research، extrapolation، meditation and then conclusion. The information was collected by interviewing the Secretary-General of the Central Library and by distributing questionnaire forms to the (33) teaching staff of the College of Higher Education. The responses of the society were analyzed the result and the recommendations were the most important 1. Information specialist and all employees of the administrators and technicians in the centers of information sources (libraries) and in the field are considered scientific r
... Show MoreIn this study, the synoptic analysis of dust storm for spring and summertime in Iraq were investigated. The images for dust provided by NASA are used to emphasize the dust storm days, while the composite maps of wind vector and geopotential 850hPa are mapped to investigate the pressure and wind direction patterns appearing with the dust condition in the same days. Spring has more dust frequency than summertime, especially in May. The frontal type of dust storm is dominant on spring, the cold air pushes the warm air that picking up the sand to the air through the vertical wind, but the southwestern high-speed wind and drought condition were controlled on the dust in summer. The northwestern wind is the main factor that carries the dust for l
... Show MoreThe present work describes the development of code for trim and longitudinal stability analysis of a helicopter in forward flight. In general, particular use of these codes can be made for parametric investigation of the effects of the external and internal systems integrated to UH-60 helicopters. A forward flight longitudinal dynamic stability code is also developed in the work to solve the longitudinal part of the whole coupled matrix of equations of motion of a helicopter in forward flight. The coupling is eliminated by linearization. The trim analysis results are used as inputs to the dynamic stability code. The forward flight stability code is applied to UH-60 helicopter.