Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
This paper presents an in-depth stylistic analysis of the linguistic artistry andliterary techniques employed by Paulo Coelho in his novel By the River Piedra ISat Down and Wept. A close reading approach guided by stylistics and linguisticsframeworks reveals Coelho's extensive incorporation of imaginative metaphors,vivid imagery, poetic diction, and resonant symbols across the narrative. Analysisspecifically elucidates how Coelho adeptly manipulates various stylistic features toconvey thematic content, shape characterization, and produce aesthetic impacts.Findings provide critical insights into Coelho’s linguistic mastery and contribute toresearch in stylistics and literary linguistics through rigorous examination of anentire contemporary
... Show MoreNew series of 4,4'-((2-(Aryl)-1H-benzo[d]imidazole1,3(2H)-diyl)bis(methylene))Diphenol(3a-g) was successfully synthesized from cyclization of the reduction product of bis Schiff bases (2) with aryl aldehydes bearing phenolic hydroxyl in the presence of acetic acid. The structure of these compounds was identified from FT-IR, 1H NMR, 13C NMR and EIMs. The Antioxidant capability was screened by DPPH and FRAP assays. Both assays showed antioxidant capability more than BHT as well. Compounds 3b and 3c showed antioxidant capacity slightly less than ascorbic acid. The docking study for theses compound was carried out as III DNA polymerase inhibitor. The results of docking demonstrated that the increase in hinderances around phenolic hy
... Show MoreThree different types of nozzles (different wear rate) were used in this study. They are classified depending on the severity of their wear to three groups: new, worn and damaged nozzles. Those nozzles were spraying with the same application rate (303 l/ha) on two-year field trials; this was achieved by changing the spraying pressure for each group of nozzles in order to get the same application rate. This practice is usually done by operators of sprayers, who calibrate the sprayers on the same application rate every year without changing the nozzles, so they tend to reduce the spraying pressure in order to compensate the flow rate increase due to the nozzles yearly wear. Two types of
In this study, poly4-(nicotinamido)-4-oxo-2-butenoic acid (PNOE) was prepared by the electro polymerization of 4-(nicotinamido)-4-oxo-2-butenoic acid (NOE) monomer on a 316 stainless steel (St.St) which acts as an anticorrosion coating. Fourier transforms infrared (FTIR), atomic force microscopy (AFM), scanning electron microscopy (SEM), and cyclic voltammetry were used to diagnose the structure and the properties of the prepared polymer layer. The corrosion behavior of the uncoated and coated 316 St.St were evaluated by using an electro chemical polarization technique in 0.2 M hydrochloric acid solution as a corrosive medium at a temperature range of 293 to 323 K. Nano materials, such as nano ZnO and graphene were added in di
... Show MoreThe research aims to determine the impact of employees’ retention strategy on organizational memory. This research is historical, descriptive, and analytical. The sample consists of 158 faculty members in five private colleges in Baghdad. The technique used to analyze the data is SEM (Structural Equation Modeling), and SPSS (Statistical Package for the Social Sciences). The research concludes that the employees retaining strategy plays a vital role in retaining employees and hence maintains organizational memory. The findings and recommendations of this research assure the administrations of private colleges that employees retention strategy play a vital role in retaining its employee and hence maintains organizational memory. T
... Show MoreThis study relates to the estimation of a simultaneous equations system for the Tobit model where the dependent variables ( ) are limited, and this will affect the method to choose the good estimator. So, we will use new estimations methods different from the classical methods, which if used in such a case, will produce biased and inconsistent estimators which is (Nelson-Olson) method and Two- Stage limited dependent variables(2SLDV) method to get of estimators that hold characteristics the good estimator .
That is , parameters will be estim
... Show MoreDiversity of the aspects of analyzing a specific linguistic issue is considered to be a
familiar phenomenon in learning Arabic in which – at different levels- various linguistic
aspects and phases – sometimes – are involved in a linguistic issue . In this paper , the
problematic issues during linguistic analysis are taken into an account. The Holy Quran
interpretation books include many Quranic expressions which have a lot of meaning described
by different interpreters , from them this paper has selected only one expression ( = كفاتا
receptacle ) from the verse "Have we not made the earth a receptacle " ( Al- Mursalat verse 25
) , this paper believes that this expression is sufficient display the interpret
The Local and Global Corporations are suffering of managerial and financial corruption phenomena, which leads them to loss and bankruptcy. So, it is necessary to search for tools which help prevent phenomena like this, and one of these tools is (corporate governance) which represent controlling tool that contribute in reducing corruption. this study aims at modifying (corporate governance system)in order to make it suitable with Iraqi government Corporations. the study depend upon main hypothesis which is (the performance level of the strategic perspective of governance system is depending upon work according to the perspective dimensions itself. From the main conclusions:-It is possible to building a strategic perspective
... Show MoreCheckpoint inhibitors are a type of immune therapy used to treat different types of cancers. These drugs block different checkpoint proteins, for example, CTLA-4, PD-1, and PD-L1 inhibitors.
They block proteins that stop the immune system from attacking the cancer cells. Checkpoints are also described as a type of monoclonal antibody that antagonizes binding between B7 to CTLA-4 and PD-L1 to PD-1.
Immune checkpoint inhibitors are used to treat BARCA mutated triple-negative breast cancer (TNBCS) in patients who do not respond to chemotherapy, and also in the treatment of highly mutated and solid tumors such as brain tumors, liver, and pancreatic cancers.
Immune checkpoint inhibitors exhibit an effect on solid tumo
... Show More