'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal
Database is characterized as an arrangement of data that is sorted out and disseminated in a way that allows the client to get to the data being put away in a simple and more helpful way. However, in the era of big-data the traditional methods of data analytics may not be able to manage and process the large amount of data. In order to develop an efficient way of handling big-data, this work studies the use of Map-Reduce technique to handle big-data distributed on the cloud. This approach was evaluated using Hadoop server and applied on EEG Big-data as a case study. The proposed approach showed clear enhancement for managing and processing the EEG Big-data with average of 50% reduction on response time. The obtained results provide EEG r
... Show MoreThere are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreOnline learning is not a new concept in education, but it has been used extensively since the Covid-19 pandemic and is still in use now. Every student in the world has gone through this learning process from the primary to the college levels, with both teachers and students conducting instruction online (at home). The goal of the current study is to investigate college students’ attitudes towards online learning. To accomplish the goal of the current study, a questionnaire is developed and adjusted before being administered to a sample of 155 students. Additionally, validity and reliability are attained. Some conclusions, recommendations, and suggestions are offered in the end.
The bandwidth requirements of the telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user.The passive optical
Discrete logarithms are applied in many cryptographic problems . For instance , in public key . and for construction of sets with disti nct sums of k-clcments. The purpose o r this paper
is to modify the method ol' informationl1·iding using discrete logarithms , introduce new properties of St - sets , uscdthe direct product of groups to construct cyclic group and finally, present modified method for knapsack &
... Show MoreThis work presents a five-period chaotic system called the Duffing system, in which the effect of changing the initial conditions and system parameters d, g and w, on the behavior of the chaotic system, is studied. This work provides a complete analysis of system properties such as time series, attractors, and Fast Fourier Transformation Spectrum (FFT). The system shows periodic behavior when the initial conditions xi and yi equal 0.8 and 0, respectively, then the system becomes quasi-chaotic when the initial conditions xi and yi equal 0 and 0, and when the system parameters d, g and w equal 0.02, 8 and 0.09. Finally, the system exhibits hyperchaotic behavior at the first two conditions, 0 and 0, and the bandwidth of the chaotic
... Show MoreIn this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.
In the current analysis, the effects of circumferential scratches along the inner surface of a 170ᵒ -arc partial journal bearing has been numerically investigated. Their impact on the thermo-elasto-hydrodynamic performance characteristics, including maximum pressure, temperature, deformation, and stress, has been examined thoroughly. The ANSYS Fluent CFD commercial code was employed to tackle the iterative solution of flow and heat transfer patterns in the fluid film domain. They are then applied to the ANSYS Static Structure solver to compute the deformation and stress resulted in the solid bearing zone. A wide range of operating conditions has been considered, including the eccentricity ratio ( ) and scratch depth (
... Show More