Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
After the twenty – first century become necessary for us motorcade era in educational a chevements by searching for the best strategies and teaching methods and techniques artotalbagesh resorting to the strategy
Did not use in use in the teaching of the foreseeable material general by voice and teaching perspective for the student of the class fourth science
In particular ,so the researcher asking the question follows:
Can the peer education strategy to have an impact in perspective drawing skill development ?
From here it demonstrated the importance of current research know the impact of p
... Show MoreThe research aims to study the contribution of tax information systems to increase tax revenues, and to identify how efficiently used information systems currently by the tax authority and their effectiveness in the detection of irregularities by the tax payers such as the cleclaration of incorrect statements that do not show real results of their business activities or hide information from sources related to their income subject to tax, which would negatively affect the outcome of tax revenues and thus damage important sourse of the public treasury of the states resources. The data of research was collected by studying and analysing the tax information systems used by the General Commission of taxs and its branches and a number of prac
... Show MoreThe research aims to introduce international valuation standards and to identify the relationship between international valuation standards and international accounting and financial reporting standards in enhancing the quality of financial reporting (appropriate accounting information) through the use of statistical models for the purpose of measuring the property of appropriateness of accounting information through the use of statistical models for the purpose of proving the hypothesis that The research referred to it, and accordingly, the Francis and Kothari models were used to measure the appropriateness of accounting information (the quality of the information). The conclusions reached by the two researchers is that the sett
... Show Moreإن التطور الهائل في منظومة تكنولوجيا المعلومات والاتصالات في العالم , أثر كثيراً في الجوانب الحياتية والاجتماعية والاقتصادية والسياسية والثقافية عامة والتربوية والتعليمية خاصة, إذ أصبح لها دور كبير في تسيير الكثير من الأمور. ولا بد من القول ان المؤسسات والمنظمات لا يمكن ان تنتقل من القرن العشرين الى القرن الحادي والعشرين إلا إذا أفادت من تكنولوجيا المعلومات والاتصالات, إذ توافر هذه التكنولوجيا الكثير من ال
... Show Moreريل لسادة الكيسياء َ جؼ البحث الى التعخؼ عمى أثخ استخاتيجية فجػة السعمػمات في التح َى جؼ البحث فقج صيغت الفخضية التي َ تػسط , والتحقق مغ ى ُ جى شلاب الرف الثاني الس َ ل جؼ البحث أعتسج الباحث َ تتعمق بالتحريل ولتحقيق ى ػعتيغ متداويتيغ ُ بي لسجس ِ ي السشيج التجخ ريل الجراسي , تكػنت عيشة البحث مغ َ ) شالب مغ شلاب ٗٛ( ذواتي اختبار بعجي لمتح -ٕٕٕٓالرف الثاني الستػسط في ( متػسصة الذييج خزيخ جاسع العارضي ) لمعاـ الجارسي (
... Show More-
The problem of the study represented in the gap between what banks possess of Information Technology and Knowledge Management and what they need to help them in decision making and problem solving and achieving High Business Value. It formed a focus and fundamental point for this study in its analysis and interpretation. This was done by a scientific methodology and five chapters.
The study aimed at analyzing the use of partnering Information Technology with Knowledge Management to achieve High Business Value at commercial banks in Jordan. Data were collected from 116 managers, experts, and advisors working for 16 Jordanian banks through a questionnaire de
The synthesis of nanoparticles (GNPs) from the reduction of HAuCl4 .3H2O by aluminum metal was obtained in aqueous solution with the use of Arabic gum as a stabilizing agent. The GNPs were characterized by TEM, AFM and Zeta potential spectroscopy. The reduction process was monitored over time by measuring ultraviolet spectra at a range of λ 520-525 nm. Also the color changes from yellow to ruby red, shape and size of GNP was studied by TEM. Shape was spherical and the size of particles was (12-17.5) nm. The best results were obtained at pH 6.
In the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial
... Show MoreThis study aimed to developing the skills of critical reading for the tenth basic school female students through a training program using the reflective thinking method. The study sample consisted of (64) students. To achieve the objective of the study, the researcher uses the quasi-experiment approach consisting of a control group (32 students) and an experimental group (32 students). The researcher used three research inventories as follows: 1) A list of critical reading skills included (30) skills within three aspects (Recognition – Deduction – Evaluation and Judgment). 2) An executive program using reflective thinking for developing critical reading skills. 3) Achievement test to measure
... Show More