Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Over the last few years, the interior designer has been given the ability to access many innovative tools for new forms of unprecedented diversity and efficiency. Some design experts have described the new parametric procedures they are introducing to create new interior projects as a radical transformation that carries all the elements of a qualitative shift in interior design. The best of these parametric procedures is the technical capabilities offered by us to create new forms that are different from what has been discussed in everything that has been produced by designers and architects since modernity and even before it to the present time, which returns our design products through a series of computer programs that perform the pro
... Show MoreObjectives To quantify the reproducibility of the drill calibration process in dynamic navigation guided placement of dental implants and to identify the human factors that could affect the precision of this process in order to improve the overall implant placement accuracy. Methods A set of six drills and four implants were calibrated by three operators following the standard calibration process of NaviDent® (ClaroNav Inc.). The reproducibility of the position of each tip of a drill or implant was calculated in relation to the pre-planned implants’ entry and apex positions. Intra- and inter-operator reliabilities were reported. The effects of the drill length and shape on the reproducibility of the calibration process were also investig
... Show MoreThe paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show MoreIn this work, the switching nonlinear dynamics of a Fabry-Perot etalon are studied. The method used to complete the solution of the differential equations for the nonlinear medium. The Debye relaxation equations solved numerically to predict the behavior of the cavity for modulated input power. The response of the cavity filled with materials of different response time is depicted. For a material with a response time equal to = 50 ns, the cavity switches after about (100 ns). Notice that there is always a finite time delay before the cavity switches. The switch up time is much longer than the cavity build-up time of the corresponding linear cavity which was found to be of the order of a few round-trip ti
... Show MoreThe problem of rapid population growth is one of the main problems effecting countries of the world the reason for this the growth in different environment areas of life commercial, industrial, social, food and educational. Therefore, this study was conducted on the amount of potable water consumed using two models of the two satellite and aerial images of the Kadhimiya District-block 427 and Al-Shu,laa district-block 450 in Baghdad city for available years in the Secretariat of Baghdad (2005, 2011,2013,2015). Through the characteristics of geographic information systems, which revealed the spatial patterns of urban creep by determining the role and buildings to be created, which appear in the picture for the
... Show MoreSurvival analysis is widely applied to data that described by the length of time until the occurrence of an event under interest such as death or other important events. The purpose of this paper is to use the dynamic methodology which provides a flexible method, especially in the analysis of discrete survival time, to estimate the effect of covariate variables through time in the survival analysis on dialysis patients with kidney failure until death occurs. Where the estimations process is completely based on the Bayes approach by using two estimation methods: the maximum A Posterior (MAP) involved with Iteratively Weighted Kalman Filter Smoothing (IWKFS) and in combination with the Expectation Maximization (EM) algorithm. While the other
... Show MorePurpose: Despite the high clinical accuracy of dynamic navigation, inherent sources of error exist. The purpose of this study was to improve the accuracy of dynamic navigated surgical procedures in the edentulous maxilla by identifying the optimal configuration of intra-oral points that results in the lowest possible registration error for direct clinical implementation. Materials and methods: Six different 4-area configurations were tested by 3 operators against positive and negative controls (8-areas and 3-areas, respectively) using a skull model. The two dynamic navigation systems (X-Guide® and NaviDent®) and the two registration methods (bone surface tracing and fiducial markers) produced four registration groups. The accuracy of the
... Show MoreDetecting and subtracting the Motion objects from backgrounds is one of the most important areas. The development of cameras and their widespread use in most areas of security, surveillance, and others made face this problem. The difficulty of this area is unstable in the classification of the pixels (foreground or background). This paper proposed a suggested background subtraction algorithm based on the histogram. The classification threshold is adaptively calculated according to many tests. The performance of the proposed algorithms was compared with state-of-the-art methods in complex dynamic scenes.
Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show More