Primary objective of the proposed system is to achieve higher level of confidentiality in absence of standard encryption techniques which add up to complexity of the stego system. In this system the principle of dominoes is adopted in the way of the selection of the pixel of the image to hide the ciphertext. Where domino stones models are prepared in advance, which are two-dimensional matrices (2*6), and selecting one of them and start the projection of the model on the image and hide the ciphertext in the pixel corresponding to the points in the domino model Experimental results show that the proposed system effectively achieve the objective. Even though the proposed system gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image can be seen by the human vision system (HVS), so this method can be considered as a success and can be adopted in the field of stege
APDBN Rashid, The College of Arts/ Al-Mustansiriyya University, 2004
The pandemic SARS-CoV-2 is highly transmittable with its proliferation among nations. This study aims to design and exploring the efficacy of novel nirmatrelvir derivatives as SARS entry inhibitors by adapting a molecular modeling approach combined with theoretical design. The study focuses on the preparation of these derivatives and understanding their effectiveness, with a special focus on their binding affinity to the S protein, which is pivotal for the virus’s access to the host cell. Considering molecular docking aspects in the scope of a study on nirmatrelvir derivatives and S protein, dynamics simulations with 25 nanoseconds of their binding are explored. The study shows that these derivatives might work as effective antivi
... Show MoreThe internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat
... Show MoreThis article focuses on identity construction and social structures within the Sāmoan community as represented in Sia Figiel’s novel Where We Once Belonged. I argue that however the post/colonial Sāmoan identity is hybridized, the essence of the individual is still connected to Fa’a Sāmoa-the Sāmoan traditions and ways. However rapid are the colonial vicissitudes, the Sāmoan literature and lifestyle are developed to be a resistance platform. This resistance platform is dedicated not only to expose the colonial impact but also to assist the social and political reconstruction of post/colonial Samoa. To this end, this article studies identity construction, and the challenges that women face within Sāmoan social structures.
In his post colonial novel, In the Skin of a lion, the Canadian/Sri Lankan writer,
Michael Ondaatje is so interested in the term "Post colonialism" because he wants to show
that the term doesn't only refer to a period of time that comes after colonialism. In other
words, post colonialism is not only referred to as a literal description of formerly colonial
societies. He deals with the termas a literary genre and an academic construct that describes
the global conditions of a man after a period of colonialism. He shows that post colonialism is
a theory that tries to examine and explore the different styles and faces of European authority
to control the colonized. Ondaatje's attempt through such term is to unmask Europ