Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreA pioneering idea for increasing the thermal performance of heat transfer fluids was to use ultrafine solid particles suspended in the base fluid. Nanofluids, synthesized by mixing solid nanometer sized particles at low concentrations with the base fluid, were used as a new heat transfer fluid and developed a remarkable effect on the thermophysical properties and heat transfer coefficient. For any nanofluid to be usable in heat transfer applications, the main concern is its long-term stability. The aim of this research is to investigate the effect of using four different surfactants (sodium dodecyl benzene sulfonate (SDBS), sodium dodecyl sulfate (SDS), cetyl trimethylammonium bromide (CTAB), and gum Arabic (GA)), each with three different
... Show MoreThe present work aims to study forward osmosis process using different kinds of draw solutions and membranes. Three types of draw solutions (sodium chloride, sodium formate, and sodium acetate) were used in forward osmosis process to evaluate their effectiveness with respect to water flux and reverse salt flux. Experiments conducted in a laboratory-scale forward osmosis (FO) unit in cross flow flat sheet membrane cell. Three types of membranes (Thin film composite (TFC), Cellulose acetate (CA), and Cellulose triacetate (CTA)) were used to determine the water flux under osmotic pressure as a driving force. The effect of temperature, draw solution concentration, feed and draw solution flow rate, and membrane types, were studied with
... Show MoreThis paper treats the interactions among four population species. The system includes one mutuality prey, one harvested prey and two predators. The four species interaction can be described as a food chain, where the first prey helps the second harvested prey. The first and the second predator attack the first and the second prey, respectively, according to Lotka-Volterra type functional responses. The model is formulated using differential equations. One equilibrium point of the model is found and analysed to reveal a threshold that will allow the coexistence of all species. All other equilibrium points of the system are located, with their local and global stability being assessed. To back up the conclusions of the mathema
... Show MoreThe interplay of predation, competition between species and harvesting is one of the most critical aspects of the environment. This paper involves exploring the dynamics of four species' interactions. The system includes two competitive prey and two predators; the first prey is preyed on by the first predator, with the former representing an additional food source for the latter. While the second prey is not exposed to predation but rather is exposed to the harvest. The existence of possible equilibria is found. Conditions of local and global stability for the equilibria are derived. To corroborate our findings, we constructed time series to illustrate the existence and the stability of equilibria numerically by varying the different values
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreClassifying an overlapping object is one of the main challenges faced by researchers who work in object detection and recognition. Most of the available algorithms that have been developed are only able to classify or recognize objects which are either individually separated from each other or a single object in a scene(s), but not overlapping kitchen utensil objects. In this project, Faster R-CNN and YOLOv5 algorithms were proposed to detect and classify an overlapping object in a kitchen area. The YOLOv5 and Faster R-CNN were applied to overlapping objects where the filter or kernel that are expected to be able to separate the overlapping object in the dedicated layer of applying models. A kitchen utensil benchmark image database and
... Show MoreIn this paper, the productions of gallium oxide (Ga2O3) nanoparticles were achieved via using the Nd: YAG laser deposition method with a fundamental wavelength (1064 nm). These nanoparticles were characterized by using different methods such as X-ray diffractometer (XRD), atomic force microscopy (AFM) and Ultraviolet–visible (UV–vis) spectroscopy. To examine the effects of laser energy on the properties of nanoparticles, the experimental results and theoretical considerations were prepared by the effective method of pulse laser deposition. The synthesis of Ga2O3NPs) was achieved with different ranges of energies (500 to 900 mJ). Average crystallite sizes of the synthesized nanopar
... Show More