'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal
HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
In this paper, a theoretical study to the effect of journal misalignment on the static characteristics of oil filled porous journal bearing when lubricated with couple stress fluid has been carried out.
The analytical model used through this work is for a bearing with isotropic permeability. Considering isotropic permeability the Reynolds' equation for the oil film is modified to include a so – called filter term and the effect of fluid coupled stress. The pressure equation for the porous medium is obtained from Darcy's law and continuity equation. The equation which was used to evaluate the oil film thickness was modified to include the effect of possible misalignment in longitudinal and transverse directions. The governing eq
... Show MoreThe aim of this research is subjected to discover The Dictation mistakes which occur
widely in the Arabic Language written by Iraqi – News papers.
The research classified These Mistakes in Three groups as Follows:
1. The first group dealing with distinguishing between the Arabic – letter ) ا ( When Written
or ) أ ( at The beginning The word and as ) ئ ( which differ in meaning from each other .
2. The second group dealing with the writing of The Arabic ) ٙ( and as ) ٛ( at the end of The
word which differ in meaning from each other.
3. The Third group dealing with distinguishing in written The Arabic letter as ) ض( or as ) )ظ
which differ in meaning From each other.
4. The fourth group dealing with Th
The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh
... Show MoreAmongst the literary writers who used their art to direct the attention towards the issue of woman and her rights in a proper life is the English poet and novelist Thomas Hardy (1840-1928), who has been praised for his “openness to the feminine principle” 1 as Irving Howe put it. Hardy’s wide readings have changed his way of dealing with and thinking about so many critical issues which started to float on the surface of the English society during the mid and late of the 19th century. His readings for a number of writers, who seem of huge impact on his writings as he later admits that – “[his] pages show harmony of view with
... Show MoreThis study aimed to evaluate oral health (OH) and periodontal diseases (PD) awareness in the Iraqi population.
This study was a questionnaire‐based online survey of two weeks duration. The questionnaire was built using a Google platform and was distributed randomly via social media (Facebook and Telegram). The questionnaire consisted of a demographic data section and two other main sections for the evaluation of OH and PD awareness. Each response was marked with “1” for a positive answer and “0” for the other answers. For each respondent, answers were summed to give
This research deals with the study of the identity lost in the novel (handcuffs of paper) by Writer (Kuwaiti / Iraqi ) Yousif Hadi Mays.This is because of The strange subject presented by the writer ,Kuwait has chosen a sbace for his novel and chose apurely Kuwaiti theme. Hence the importance of the novel, as it came to the subject of identity completely dntdiffere from what we wwrote after the fall off the regime (2003), Which is related to the last coming from outside the country, which remained oscillataing between his mother,s identity where language, religion and history and the identity of the other by virtue and dazzling, and integration and here con not belong to either party. This is a violation of the taboos of
... Show MoreWith the rapid development of smart devices, people's lives have become easier, especially for visually disabled or special-needs people. The new achievements in the fields of machine learning and deep learning let people identify and recognise the surrounding environment. In this study, the efficiency and high performance of deep learning architecture are used to build an image classification system in both indoor and outdoor environments. The proposed methodology starts with collecting two datasets (indoor and outdoor) from different separate datasets. In the second step, the collected dataset is split into training, validation, and test sets. The pre-trained GoogleNet and MobileNet-V2 models are trained using the indoor and outdoor se
... Show More