Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
This study aimed to know the concentration of elements content in dairy products. Nine samples collected from the local market in Baghdad, two samples of milk and seven of yoghurt.The results were followed: The ratio of Aluminum In Aluminum cans That is used for storage milk and industrialize yoghurt is about 95.5% ,this ratio is against [1] which said that pureness of Aluminum used in Aluminum cans should not be less than 98-99% . and the ratio of Cadmium reached to 0.001% which is also against [1] which assure that the Aluminum cans should be clean from that element, mean while the concentration of Iron, Copper and Zinc were within the standard level. The highest concentration of Iron was in treatment B2(canon yoghurt)it was 9.95 m
... Show MoreThis study sheds light on the syndromes (grammatical pairs) in the section of sympathy, especially the affection and sympathy according to the normative rule governed by the synthetic correlation of the elements of the Arabic sentence and their structural composition, which leads to a verbal presumption governing their association with each other (called).
One of the syndromes of the grammarians is that which is between the emotion and his income, so they follow their functional and structural conditions, and they have also noticed a phenomenon that leads to their incompatibility and prevents their direct contact through the occurrence of a separation between them resulting in their separation, which is called separation. Grammar).
The current study is unique in its emphasis on investigating design operation and concept from multiple scientific perspectives: including invention, technique, and design components. This research tends to study the methodology and creation of design process in a holistic manner so that the readers may grasp their characteristics and properties down to its minute epistemological detail. The investigation of the design concept is where the real groundwork and pressing need for the study begin. Creation and methodology are two primary concepts in relation to design these relationships can be formed in any design because of the various forces that act upon it. The primordial objective of this study is to evaluate the relationship betw
... Show MoreDiesel generators is widely used in Iraq for the purpose of maintaining electric power demand. Large number of operators engaged in this work encounters high level of noise generated by back pack type diesel generators used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known., in present research , quastionaire was adsministered 86 repondents in Baghdad city were exposured to wide range of noise level (80-110) dB(A) with different ages and they have different skill discretion levels. Noise levels A-weigthed decibles dB(A) were measured over 8 weeks two times aday during the 2019 summer using a sound level meter.For predicting the wo
... Show MoreHonorifics are linguistic expressions which maintain social as well as religious respect to other people. They are linguistic techniques which express politeness to other interlocutors. Semantically speaking, honorifics are of two types: al-Laqab (title) and al-Kuniya (teknonyms) following a specific word order. They form part of the Arab recognitions and are mold into their social and communicative competence.
The study focuses upon religious and regional honorifics which convey deference and respect. It assumes that religious and cultural recognitions play vital roles in formulating and embedding the sense of honorifics. It is hypothesized that Arab people express respect to religious personalitie
... Show MoreTolerance and its impact on building society
Background .To know the incidence of adenoid hypertrophy in adults causing nasal obstruction and other nasal complains.
Methods.Prospective studyof(140 ) adult patientstheir main chief complaint were nasal obstruction , presented to Otolaryngology department at Aljumhory Teaching Hospital in Mosul , from the period (september 2010 to september 2011) ,their age ranged from (21 to 53) years . They were investigated clinically, radiologicaly ,and nasal endoscopic examination was carried out (rigid and fibro-optic ) . Adenoidectomy was performed for those with adenoid hypertrophy and sent for histopathological study .
Results:. we found adenoid enlargement in(24) patients (17.14%),in addition to nasalobstruction they were also complain
Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio