Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
Background: This study aimed to evaluate the outcome of long-term results of dacryocystorhinostomy (DCR) techniques in specialized eye care center in Iraq.
Subjects and Method: This is a prospective study of 650 patients from July 2014 to July 2019 with nasolacrimal duct obstruction in Ibn Al Haitham Eye Teaching Hospital. A preoperative questionnaire was done, then one month, three months, six months and one year postoperatively. The success of surgery defined as follow; Absence of epiphora completely, Resolve of dacryocele or mucocele or any new attack of daryocystitis, Appearance of fluorescein dye from nose in fluorescein disappearance test, Successful irriga
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreThe paper investigates the impact of role-playing as a classroom technique on Iraqi EFL students’ speaking skill on Iraqi EFL students at the college level. The students are 40 college language students in University of Baghdad, College of Education Ibn-Rushd randomly chosen. Then, they were divided into two groups, experimental and control groups. Thirty questions were applied to both groups as a pre-test of speaking and the students asked to answer them orally. The experimental group was taught speaking skill of the targeted role-play technique while the control group was taught in traditional method. After 20 lessons of the teaching, the post-test of speaking was conducted in which the students in both groups were asked to answ
... Show MoreShort Multi-Walled Carbon Nanotubes functionalized with OH group (MWCNTs-OH) were used to synthesize flexible MWCNTs networks. The MWCNTs suspension was synthesized using Benzoquinone (BQ) and N, N Dimethylformamide alcohol (DMF) in specific values and then deposited on filter paper by filtration from suspension (FFS) method. Polypyrrole (PPy) conductive polymer doped with metallic nanoparticles (MNPs) prepared using in-situ chemical polymerization method. To improve the properties of the MWCNTs networks, a coating layer of (PPy) conductive polymer, PPy:Ag nanoparticles, and PPy: Cu nanoparticles were applied to the network. The fabricated networks were characterized using an X-ray diffractometer (XRD), UV-Vis. spectrometer, and Ato
... Show MoreSeek Iraqi insurance companies to face the global changes today that may affect the overall performance of the company, it must find an effective means of providing everything you need company information, and by increasing attention to administrative operations in general, especially the marketing process, which from its core focus on activities related to elements of the marketing mix, as the success of any company in achieving the planned objectives, linked to its ability to make sound decisions in the context of the above elements, for the latter of great importance, especially if based on facts and indicators obtained from th
... Show MoreThe present research aims to know :
The level of Cognitive failures, information processing styles, and the problem-solving among the university students ,so it is aims to know the contribution of cognitive failures on the information processing styles and problem-solving, the research sample was (400) males and females student from the University of Wasit chosen randomly from both gender and for the study of the morning and evening .So these scales had been used as a research tool (failures cognitive scale ,the scale of information processing styles , and the scale of problem solving) , and by using the statistical m
... Show MoreGIS is characterized by great potentialeties to deal with huge geographical data and conclude what is necessary for it. It was very useful to get use of the potentialities of this system of GIS in the field of archaeology and to harvest very accurate results in a relatively short time, compared to the old archaeological methods.