Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
In this paper, the using of Non-Homogenous Poisson Processes, with one of the scientific and practical means in the Operations Research had been carried out, which is the Queuing Theory, as those operations are affected by time in their conduct by one function which has a cyclic behavior, called the (Sinusoidal Function). (Mt / M / S) The model was chosen, and it is Single Queue Length with multiple service Channels, and using the estimating scales (QLs, HOL, HOLr) was carried out in considering the delay occurring to the customer before his entrance to the service, with the comparison of the best of them in the cases of the overload.
Through the experiments
... Show MoreAbstract
The research Compared two methods for estimating fourparametersof the compound exponential Weibull - Poisson distribution which are the maximum likelihood method and the Downhill Simplex algorithm. Depending on two data cases, the first one assumed the original data (Non-polluting), while the second one assumeddata contamination. Simulation experimentswere conducted for different sample sizes and initial values of parameters and under different levels of contamination. Downhill Simplex algorithm was found to be the best method for in the estimation of the parameters, the probability function and the reliability function of the compound distribution in cases of natural and contaminateddata.
... Show More
The importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process
... Show MoreThe assessment of the environmental impact of the cement industry using the Leopold Matrix is to determine the negative and positive impacts on the environment resulting from this industry, and what are the long-term and short-term effects, direct and indirect, and the amount of these effects and potential risks, and that this evaluation process is done through a number of methods, including Matrix method, including (Leopold).
The importance of the research because the cement occupies is of great importance in the world, especially in our country, Iraq, in the sector of construction and modernity, and the toxic emissions and solid waste produced by the production of this material. <
... Show MoreThis study was focused on biotreatment of soil which polluted by petroleum compounds (Diesel) which caused serious environmental problems. One of the most effective and promising ways to treat diesel-contaminated soil is bioremediation. It is a choice that offers the potential to destroy harmful pollutants using biological activity. The capability of mixed bacterial culture was examined to remediate the diesel-contaminated soil in bio piling system. For fast ex-situ treatment of diesel-contaminated soils, the bio pile system was selected. Two pilot scale bio piles (25 kg soil each) were constructed containing soils contaminated with approximately 2140 mg/kg total petroleum hydrocarbons (TPHs). The amended soil:
... Show MoreAbstract:
If we neglect the value of historical fashions as a source of inspiration for
contemporary fashion designers we will neglect a treasure of original designs.
In neglecting such a treasure how could we then know what is original. Today
the most famous fashion designers are often inspired, in the outwardly from
and internal lines of their fashions, by fashion designed during the ages of the
past.
Designers can find such fashions in books of history and museums. But
the historical ages are not equal in the fertility of the originality and novelty of
their fashions. Thus the contemporary designer may not find the old designs
inspiring so he invents them.
The researcher was keen in this paper to inclu
Abu Firas al- Hamdani is one of the most prominent abbasid poets Who characterized their poetry with high artistic quality especially in his Romyate which blended the quality of feelings of grief, sorrow, longing and nostalgia that makes sensitive self conflict that stems with time from one hand and with place on the other hand. Because we are dealing with a poet lived west spatial coercive which it has been hurt him within a time conflict swinging between despair and some times patience and hope other times between the present and his painful reality also between the past and the beautiful times.
This researcher is to stand on this Romyat by monitoring effectiveness of the poetic text based on conflict between the presenc
Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show More