Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
The main purpose of the paper is to identify the controllability of an existing production system; yogurt production line in Abu Ghraib Dairy Factory which has several machines of food processing and packing that has been studied. Through the starting of analysis, instability in production has been found in the factory. The analysis is built depending on experimental observation and data collection for different processing time of the machines, and statistical analysis has been conducted to model the production system. Arena Software is applied for simulating and analyzing the current state of the production system, and results are expanded to improve the system production and efficiency. Research method is applied to contribute in knowi
... Show MoreThe issue of insurance against unlawful risks raises a jurisprudential and judicial debate between two opposing trends: the first considers coverage of these risks invalid due to their impact on public order or morals, while the second—which this research analyses—calls for the possibility of covering these risks in specific circumstances, based on contractual considerations in accordance with the principle that the contract is the law of the contracting parties, and based on the obligation to compensate the harmed third party—the victim—who has no connection to the unlawful act. In this context, our research highlights that contractual considerations can justify coverage of some unlawful risks, provided that the goal is to achieve
... Show MorePerhaps the issue of media and the press, especially one of the most common topics that people deliberate and deal with permanently and continuously. An issue of such significance has pushed researchers to put the following question, “Is it possible to live without media?”, “Can people ignore the newspaper, radio, TV, or the other communication means?”
The answer is very simple. It is difficult for civilized society to overtake information, or dispense with circulation, at the individual or collective level. Yet, the question of how to make the media and how it determines its content still requires extensive media experience; and knowledge of the social structure and its relations; and ac
... Show MoreEmbedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
Comprehensive automobile insurance is considered as an important branches in the portfolio of National Insurance Company in Iraq .Due to the continous accidents the company is endeavouring to this market.
The company faces several obstacles and limitations in marketing the policies of this portfolio due to certain factors and influences beyond the control of the company and others internal mainly connected with the reduction of the marketing programmes of the company .
The target of this study is to focus the light upon the interal factors which can be gorerned by the company,confronted and solved.
The research aims to use performance indicators and financial criteria in evaluating the economic feasibility of the company's insurance portfolios. In addition to identifying the strengths and weaknesses in portfolio's performance to enhance the strengths and address the weaknesses. This is consistent with research problem that dealt with the performance indicators, economic feasibility of company's portfolios and contributing to their improvement, reducing the financial and insurance risks associated with company's business. The research’ sample is represented by the Iraqi Insurance Company as it is one of the oldest financial institutions operating in the insurance sector. It has identified (5) insurance portfolios (marine, engineer
... Show MoreComprehensive automobile insurance is considered as an important insurance which is managing by National Insurance Company due to the continuous accidents the company is endeavoring to this market not for trading motives only but also to increase the insurance awareness of people and insurance benefit for other insurance portfolios .On this basis the researcher had chosen her subject ( obstacles in marketing comprehensive automobile Insurance policy ) the company faces several obstacles and limitations in marketing the policies of this portfolio due to certain factors and influences beyond the mainly connected with the reduction of marketing programmes of the company . the aim of this study is to shade the light upon the internal factors
... Show More
The topological parameters of the metal-metal and metal-ligand bonding interactions in a trinuclear tetrahydrido cluster [(Cp*Co) (CpRu)2 (μ3-H) (μ-H)3]1 (Cp* = η5 -C5Me4Et), (Cp = η5 -C5Me5), was explored by using the Quantum Theory of Atoms-in-Molecules (QTAIM). The properties of bond critical points such as the bond delocalization indices δ (A, B), the electron density ρ(r), the local kinetic energy density G(r), the Laplacian of the electron density ∇2ρ(r), the local energy density H(r), the local potential energy density V(r) and ellipticity ε(r) are compared with data from earlier organometallic system studies. A comparison of the topological processes of different atom-atom interactions has become possible than
... Show More