Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
Two- dimensional numerical simulations are carried out to study the elements of observing a Dirac point source and a Dirac binary system. The essential features of this simulation are demonstrated in terms of the point spread function and the modulation transfer function. Two mathematical equations have been extracted to present, firstly the relationship between the radius of optical telescope and the distance between the central frequency and cut-off frequency of the optical telescope, secondly the relationship between the radius of the optical telescope and the average frequency components of the modulation transfer function.
Abstract
Research title: The legal ruling of advice.
This research deals with the topic of advice, as the research included the following:
Preamble: I explained in it the meaning of advice in the Qur’an and Sunnah, and that what is meant by it is a good performance of the duty, then explaining its importance, importing it, and the difference between advice and what is similar to it, from enjoining good, denial, reproach and reprimand, backbiting and the will.
The first topic: It dealt with the ruling on advice, whether it is recommended or disliked, or forbidden, because what is meant by it is to give advice to others may be an obligation in kind, or it may be desirable or dislike
... Show More
Abstract
Friction stir welding is a relatively new joining process, which involves the joining of metals without fusion or filler materials. In this study, the effect of welding parameters on the mechanical properties of aluminum alloys AA2024-T351 joints produced by FSW was investigated.
Different ranges of welding parameters, as input factors, such as welding speed (6 - 34 mm/min) and rotational speed (725 - 1235 rpm) were used to obtain their influences on the main responses, in terms of elongation, tensile strength, and maximum bending force. Experimental measurements of main responses were taken and analyzed using DESIGN EXPERT 8 experimental design software which was used to develop t
... Show MoreIn this study the isomerization of desulfuerized light Iraqi petroleum naphtha (Al-Dura Refinery) with boiling point range of 37 to 124 °C , 80.5 API specific gravity and 68.2 octane number has been investigated. Two types of catalysts were prepared (Pt/HX and Pt/SrX) by impregnation of 0.8 wt% Pt on l 3X-zeolite. The catalyst activity and selectivity toward isomerization, and catalyst deactivation were investigated.
The isomerization unit consisted of a vertical tubular stainless steel reactor of 2 cm internal diameter, 3 cm external diameter and 68 cm height. The operating pressure was atmospheric for all experimental runs. The liquid flow of lightnaphtha was 0.4 Uh, and the catalyst weight was 50 gm, H/
... Show MoreMicrobial antibiotics resistance is considered a serious health issue in the Middle East and developing countries. In this study, the Fe2O3 nanoparticles was prepared chemically, and the particles size and shape were analyzed by using Scan electron microscope (SEM) and X-Ray diffraction (XRD). Different concentration of Fe2O3 nanoparticles were used and examined on E.coli and S. aureus. Using liquid dilution and in vitro cytotoxicity assay by microplate toxicity test (MTT). The microbial cell metabolic activity was measured on gram-negative, gram-positive bacteria and fungi after treating with different concentrations of Fe2O3 nanoparticl
... Show MoreThe aim of this work is to detect the best operating conditions that effect on the removal of Cu2+, Zn2+, and Ni2+ ions from aqueous solution using date pits in the batch adsorption experiments. The results have shown that the Al-zahdi Iraqi date pits demonstrated more efficient at certain values of operating conditions of adsorbent doses of 0.12 g/ml of aqueous solution, adsorption time 72 h, pH solution 5.5 ±0.2, shaking speed 300 rpm, and smallest adsorbent particle size needed for removal of metals. At the same time the particle size of date pits has a little effect on the adsorption at low initial concentration of heavy metals. The adsorption of metals increases with increas
... Show MoreThe global food supply heavily depends on utilizing fertilizers to meet production goals. The adverse impacts of traditional fertilization practices on the environment have necessitated the exploration of new alternatives in the form of smart fertilizer technologies (SFTs). This review seeks to categorize SFTs, which are slow and controlled-release Fertilizers (SCRFs), nano fertilizers, and biological fertilizers, and describes their operational principles. It examines the environmental implications of conventional fertilizers and outlines the attributes of SFTs that effectively address these concerns. The findings demonstrate a pronounced environmental advantage of SFTs, including enhanced crop yields, minimized nutrient loss, improved nut
... Show MoreThe aim of the research is to demonstrate the impact of the dimensions of the marketing vigilance represented by (environmental scanning, diagnostic capacity, validity and decision-making) and to attract deposits represented by (customer relationship management strategy, distribution strategy (location), promotion strategy), as the research was applied in each of Banks (Assyria International, Iraqi Middle East Investment, Business Bay, Iraqi Investment, Babel, Al Mansour Investment), and the questionnaire was adopted as a main tool for collecting data and information from a sample of (110) who are in the position (department manager, department manager, assistant Section Director, Division Officer, Unit Officer), and the statistical prog
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show More