With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and in practice, through example.
In this paper, a theoretical analysis of optimum bed thickness operates under mass transfer control for realizing a high efficiency and reaction conversion of an electrochemical reactor has been made based on flowthrough porous electrode (FTPE) configuration. Many models have been used to represent the optimum bed thickness by taking a look into previous works concerned and collecting all related information, data, and models. The parameters that affect the optimum bed thickness have been visualized and reviewed, and almost all of them have been examined by experimental data from different sources and based on the various models. It has been found that the increase in electrolyte flow rate, concentration, limiting current density, and sp
... Show MoreAbstract
Asthma is a complex disease defined by chronic airway inflammation and airflow limitation causing variable respiratory symptoms which include shortness of breath (SOB), wheezing, chest tightness and cough. Asthma guidelines advocate adding a second long acting bronchodilator to medium doses of inhaled corticosteroids (ICS) rather using high doses of ICS alone to control moderate to severe persistent asthma. The aim of this study was to evaluate the clinical outcomes of three medication regimens indicated for Iraqi patients suffering from persistent asthma.
This study was interventional randomized clinical study conducted on a sample of adult Iraqi asthm
... Show MoreThe potential application of granules of brick waste (GBW) as a low-cost sorbent for removal of Ni+2ions from aqueous solutions has been studied. The properties of GBW were determined through several tests such as X-Ray diffraction (XRD), Energy dispersive X-ray (EDX), Scanning electron microscopy (SEM), and BET surface area. In batch tests, the influence of several operating parameters including contact time, initial concentration, agitation speed, and the dose of GBW was investigated. The best values of these parameters that provided maximum removal efficiency of nickel (39.4%) were 1.5 hr, 50 mg/L, 250 rpm, and 1.8 g/100mL, respectively. The adsorption data obtained by batch experiments subjected to the Three i
... Show MoreAbstract
Objective : the aim of the study is to evaluate the effectiveness of nurse’s practices and knowledge program toward care of patient with cardiopulmonary bypass .Methodology: A pre-experimental design (one group pretest- posttest design) was used to carry out this study in three governmental hospitals in Baghdad ( Iraqi Centre for Heart Diseases , Ibn – Albitar Centre for Cardiac Surgery and Ibn – Alnafees Centre for Cardiothoracic and Vascular Surgery ) for the period from 15th of May 2022 into 20th of April 2023.The construction and development of the program and instruments had carry out by the researcher to measured the purposes of the study , twenty two nurses was purposively assigned for the study group . The
... Show MoreMany waste materials can be repurposed effectively within asphalt concrete to enhance the performance and sustainability of pavement. One of these waste materials is sawdust ash (SDA). This study explores the beneficial use of SDA as a substitute for limestone dust (LD) mineral filler in asphalt concrete. The replacement rate was 0%, 15%, 30%, 45%, and 60% by weight of total mineral filler. Scanning electron microscopy (SEM) was employed to assess the surface morphology of Sawdust (SD), SDA, and LD. In addition, a series of tests, including Marshall stability and flow, indirect tensile strength,moisture susceptibility, and repeated uniaxial loading tests, were conducted to examine the performance characteristics of asphalt mixtures of diffe
... Show MoreThe insulation system of a machine coil includes several layers made of materials with different characteristics. The effective insulation design of machine coils, especially in the machine end winding, depends upon an accurate model of the stress grading system. This paper proposes a modeling approach to predict the transient overvoltage, electric field, and heat generation in machine coils with a stress grading system, considering the variation of physical properties in the insulation layers. A non-uniform line model is used to divide the coil in different segments based on material properties and lengths: overhang, stress grading and slot. The cascaded connection of chain matrices is used to connect segments for the representation of the
... Show MoreThe current research aims at testing the relationship between organizational immunity and preventing administrative and financial corruption (AFC) in Iraq. The Statistical Package for the Social Sciences program (R& SPSS) was used to analyse the associated questionnaire data. The research problem has examined how to activate the functions of the organizational immune system to enable it to face organizational risks, attempt to prevent administrative and financial corruption, and access the mechanisms by which to develop organizational immunity. A sample of 161 individuals was taken who worked in the Directorate General of Education, Karbala. Also, it was concluded to a lack of memory function for organizational immunity. In a
... Show MoreAn approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More