In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a cover that is digital color image for hiding a text in that selected cover for testing a proposed method of generating the private key. The hiding algorithm used is least significant bit (LSB). Finally, the generated key is tested by hiding process and changing the extension of image, after that notice the generated key is not changed or modified. the Matlap language is used to design and implement a proposed method.
The comparative method plays a major role in Maupassant’s novel (A woman’s Life).This is due to a good theme choice and smooth writing style characterized by simplicity, spontaneity and brevity.
The author uses the comparative method in the introduction of his novel where he compares the monastery’s closed world to the open world of the countryside of La Normandie, which represents the dream life of the heroine Jeanne.
The present paper is an attempt to answer the question regarding the importance of applying the comparative method in the novel (A Woman’s Life) by Maupassant. The paper stresses the fact that the novelist employs the comparative method in his book for certain features .One of these features is the
... Show MoreA hierarchically porous structured zeolite composite was synthesized from NaX zeolite supported on carbonaceous porous material produced by thermal treatment for plum stones which is an agro-waste. This kind of inorganic-organic composite has an improved performance because bulky molecules can easily access the micropores due to the short diffusion path to the active sites which means a higher diffusion rate. The composite was prepared using a green synthesis method, including an eco-friendly polymer to attach NaX zeolite on the carbon surface by phase inversion. The synthesized composite was characterized using X-ray diffraction spectrometry, Fourier transforms infrared spectroscopy, field emission scanning electron microscopy, energy d
... Show MoreThe topic of the research dealt with the image of Iraq in the British press based on a sample of the newspapers (The Guardian and the Daily Telegraph), which are among the most important and largest newspapers in the United Kingdom and the world, because of its active role in guiding local and international public opinion towards important issues and events, Since these two newspapers are interested in the accuracy of sensitive political topics, the message aimed at knowing the media image that these two newspapers painted about Iraq in the period that was limited to the first quarter of 2019, and also to know the nature of the contents promoted by these newspapers about the Iraqi reality, The method of content analysis was used as an ap
... Show More
The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra
... Show MoreEach organization has values and objectives, tangible and intangible properties of its products. The reflection of properties on the brand constitutes the identity of the brand that contributes to building the customer's convictions about the products or services provided by any organization and its brand in a positive or negative way. This is reflected in purchasing behavior, which may push forward the progress towards marketing goals or deviation from them. Therefore, the current research came to identify the brand identity, its types and the factors affecting them and how they affect to achieve each of the marketing goals. At a time when
... Show MoreThis paper aims to propose a hybrid approach of two powerful methods, namely the differential transform and finite difference methods, to obtain the solution of the coupled Whitham-Broer-Kaup-Like equations which arises in shallow-water wave theory. The capability of the method to such problems is verified by taking different parameters and initial conditions. The numerical simulations are depicted in 2D and 3D graphs. It is shown that the used approach returns accurate solutions for this type of problems in comparison with the analytic ones.
In this study, the modified size-strain plot (SSP) method was used to analyze the x-ray diffraction lines pattern of diffraction lines (1 0 1), (1 2 1), (2 0 2), (0 4 2), (2 4 2) for the calcium titanate(CaTiO3) nanoparticles, and to calculate lattice strain, crystallite size, stress, and energy density, using three models: uniform (USDM). With a lattice strain of (2.147201889), a stress of (0.267452615X10), and an energy density of (2.900651X10-3 KJ/m3), the crystallite was 32.29477611 nm in size, and to calculate lattice strain of Scherrer (4.1644598X10−3), and (1.509066023X10−6 KJ/m3), a stress of(6.403949183X10−4MPa) and (26.019894 nm).
The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use
... Show More