In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreMost of the propositions and researches that dealt with fashions in the Middle East, specifically this region from the world, from a historical perspective have not been sufficient, and were characterized by many aspects of immature thinking, in addition, they have been varied in quality. This can be attributed to many factors including: the focus in the field of researches and Middle East studies is on languages, arts, history, and political thinking of the region. Other factors are the information asymmetry, the differences in sources and references, in addition to differences in the scientific value of these sources added to the difficulty of gathering them at the same time especially that these sources are scattered in many places wh
... Show MoreThis paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIraq is Suffering nowadays from the criminal triad represented by the fiscal and administrative corruption, money laundering and terrorism, which are intertwined in a very related relations, as each of them support the other . Since the over growth has been one of its characteristics leaving behind a very dangerous negative effects whether it was social , economic or even political impacts . As a result , this trial is now represents a high risk that threatens the present and the future of Iraq . On the political , economic and social level , it is well to mention that the poor direct investment , the increasing rates of poverty , unemployment , inflation as well as the smuggling of goreign currency an
... Show MoreAbstract:
This study aims to identify the level of patients’ satisfaction among a sample of hospitalized patients in the targeted hospital (Al-Kindy Teaching Hospital, and Al-Yarmook Teaching Hospital). Moreover, this study highlights the reality of services for patients, especially in the targeted governmental teaching hospitals. The Patient Satisfaction with Nursing Care (PSNCS) has been measured in these hospitals through the revised scale by Tang et al, (2013).This scale includes four major domains; Health Information (5 items), Influencing Support (4 items), Decision Control (4 items), Specialized Technical Competence (7 items). The method of surveying patients’ opinions about the degree
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreObjective: We hypothesized that attacking cancer cells by combining various modes of action can hinder them from taking the chance to evolve resistance to treatment. Incorporation of photodynamic therapy (PDT) with oncolytic virotherapy might be a promising dual approach to cancer treatment. Methods: NDV AMHA1 strain as virotherapy in integration with aminolaevulinic acid (ALA) using low power He-Ne laser as PDT in the existing work was examined against breast cancer cells derived from Iraqi cancer patients named (AMJ13). This combination was evaluated using Chou–Talalay analysis. Results: The results showed an increased killing rate when using both 0.01 and 0.1 Multiplicity of infection (MOI) of the virus when combined with a dose of 617
... Show MoreSystemic lupus erythematosus (SLE) is an autoimmune disease with polymorphic expression. B cells have an essential contribution in immune system activation via the production of different cytokines and functioning as potent antigen-presenting cells. Therefore, a drug that particularly targets B cells may represent an ideal therapeutic approach for SLE. Rituximab (RTX), an anti-CD20 monoclonal antibody causing transient B-cell depletion, has been used to manage SLE. This study aims to assess Rituximab effects on lupus nephritis (LN) patients when added to conventional immunosuppressants. Twenty four patients, 15-32 years old, with class III/IV/V LN were involved in this study. All were on steroids before lupus nephritis occurrence. They were
... Show MoreSystemic lupus erythematosus (SLE) is an autoimmune disease with polymorphic expression. B cells have an essential contribution in immune system activation via the production of different cytokines and functioning as potent antigen-presenting cells. Therefore, a drug that particularly targets B cells may represent an ideal therapeutic approach for SLE. Rituximab (RTX), an anti-CD20 monoclonal antibody causing transient B-cell depletion, has been used to manage SLE. This study aims to assess Rituximab effects on lupus nephritis (LN) patients when added to conventional immunosuppressants. Twenty four patients, 15-32 years old, with class III/IV/V LN were involved in this study. All were on steroids before lupus nephritis occurrence. They were
... Show More