The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embedding of several stages of complexity. Also, LSB method via using the whole image is to increase the security and robustness of the proposed method as compared to state-of the-art methods.
The research aims to identify the obstacles facing the application of electronic management in our university libraries, including the central library of the University of Baghdad and the central library of Al-Mustansiriya University, the research sample, as they are among the main libraries that used electronic technologies in managing some of their work and in providing their services, and they have a website via the Internet. The research relied on the case study method to identify the obstacles by visiting the two libraries, interviewing their managers and employees responsible for the departments, and answering inquiries about the obstacles that prevent the application of electronic management in order to identify them and find appropr
... Show MorePurpose: The research aims to build an integrated knowledge framework for the basic research topic. The spirituality of the workplace is through access to the most important scientific proposals on these topics. In management thought framing, the knowledge within them in a serious attempt is to provide the appropriate answers about the intellectual dilemma of research by diagnosing the nature of the relationship with the influential elements and its historical development . Methodology: The study is relied on the analytical survey method. The research sample targeted (88) managers in the center of the Iraqi Ministry of Health exclusively from the researched senior leaders (general manager, assistant general manager, and head of department),
... Show MoreAbstract
Through this study, I tried to identify the grammatical efforts of one of the most important authors of the footnotes that were built on the luminous benefits marked with (Explanation of Mulla Jami in Grammar), and he is Sheikh Isamah Allah Al-Bukhari, who died in the eleventh century AH, trying as much as possible to stay away from the path of tradition in repeating the efforts of Those who preceded me in explaining the grammatical efforts of many grammarians, and perhaps what helped me in this is the characteristics that characterize the notes owners that may distinguish them from other owners of grammatical authorship, as a result of what characterized the personality of the notes owners from the predominance of the in
... Show MoreThe objective of the research is to measure the impact of social responsibility on the financial performance of the National Bank of Iraq for the period from 2014 to 2016 (3 years) through discussing and analyzing the level of practice of the Bank of Baghdad for social responsibility and the impact on their financial performance during the period. To measure the independent variable (CSR), the researcher used the CSR Disclosure Index and relied on the ROA as an indicator to measure the dependent variable (financial performance). The results of the research showed the main hypothesis of the research, which states that the social responsibility of the banks has no significant impact on the financial performance. In relation to the disclosu
... Show MoreThis paper tries to understand the poetic reference in the images of woman, she-camel, horse and their manifestations in Tarafah-ibnulAbd's poetry. There has got my attention the fact that these three images have their own distinct taste which is characterised by a clear rhythm, let alone the lively nature that is filled with liveliness and activity to be in harmony with the poet's youth. For these three images represented the best manifestations of his psychological and artistic poetics. The paper adopts an artistic analysis to arrive at the psychological aspects of these experiences-the woman, the she-camel, and the horse- and to understand the functions of their images and symbolic reference.
The study aims to highlighting the Creative Accounting practices, identifying their impact on non reliability of financial statement of Insurance companies and Iraqi Public Reinsurance Company. Certain executive managements resort to creative accounting to falsely portray a better image to financial statement users by means of a set of techniques and mechanisms. Thus, impacting the company activities, The study was carried out in state insurance companies and Iraqi Public Reinsurance Company. Miller model is adopted to measure earning management practices. It is one of the tools to detect creative accounting practices and to measure reliability of accounting information of financial statements by applying “White” scale on
... Show MoreBackground: This study aimed to assess the effect of tooth width in malocclusion in relation to normal, crowding, and spacing dentition. Materials and methods: The sample included dental casts of some dental students and orthodontic patients; their age was (18-25) years and having three groups normal, crowding, and spacing dentition groups. The sample was equally divided to three groups normal, crowding, and spacing dentition groups, each group contained 50 maxillary and 50 mandibular casts that were further subdivided by gender; all the stone casts were measured by highly sensitive digital vernier. Results and Conclusions: Non-significant side difference was found in both dental arches in the three studied groups. Males had higher mesiodis
... Show MoreElectronic banking services appeared as a result of laying the foundations for the application of electronic automation in the banking field, and despite the clear expansion in its adoption and implementation as an inevitable necessity imposed by international and national developments, its application was not ideal according to the level that was expected to occur after the abandonment of traditional banking services, which produced some risks Which is evident in the absence of a legal system, whether at the level of proving and authoritative electronic banking services such as electronic signature, Or at the level of protecting the confidentiality of these services and ensuring that they are not exp
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreThe aquatic crude extract of Silybum marianum dry grains prepared by melting them in distil water by the method of soak and shake. The effect of Silybum marianum crude extract studied in vitro on three tumor cell line the Hep-2, AMN-3 and RD for 24, 48 and 72 hours of exposure, and one cell line of normal cells REF for 72 hr exposure. The results showed that the prescence of toxic effect of the aquatic crude extract on the cell lines of Hep-2, AMN-3 and RD at 10 and 100 µg/ ml upto the higher concentrations when they exposed to the extract for 48 hr. as compared with the control treatment, and when the exposure period increased to 72 hr. the toxic effect started at low concentrations (5 and 10 µg/ ml) as compared with the control g
... Show More