Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space) position of in the cover text that used to hide the the secrete sender masseges. The experiments results show that the suggested method presents highly secret due to use the multi-level of complexity to avoid the attackers.
Aim: To evaluate the effect of two bonding systems and two curing systems on sealing ability of class V composite restorative materials. Materials and methods: This study was performed in vitro on 40 caries free upper first premolar teeth. The Standardized class V cavity preparation on buccal and lin- gual surfaces of each tooth was done. Then the teeth were randomly divided into two major groups each of twenty. 40 cavities were performed on these teeth and the first group7th generation bonding agent (i Bond) were applied according to the manufacturer instructions and single increment of univer- sal composite (XRV Herculite) from kerr were applied and twenty of the cavities were cured with con- ventional light cure device (astralis-5) and t
... Show MoreGas-lift technique plays an important role in sustaining oil production, especially from a mature field when the reservoirs’ natural energy becomes insufficient. However, optimally allocation of the gas injection rate in a large field through its gas-lift network system towards maximization of oil production rate is a challenging task. The conventional gas-lift optimization problems may become inefficient and incapable of modelling the gas-lift optimization in a large network system with problems associated with multi-objective, multi-constrained, and limited gas injection rate. The key objective of this study is to assess the feasibility of utilizing the Genetic Algorithm (GA) technique to optimize t
The Neutron Fermi Age, t, and the neutron slowing down density, q (r, t) , have been measured for some materials such as Graphite and Iron by using gamma spectrometry system UCS-30 with NaI (Tl) detector. This technique was applied for Graphite and Iron materials by using Indium foils covered by Cadmium and the measurements done at the Indium resonance of 1.46 eV. These materials are exposed to a plane 241Am/Be neutron source with recent activity 38 mCi. The measurements of the Fermi Age were found to be t = 297 ± 21 cm2 for Graphite, t = 400 ± 28 cm2 for Iron. Neutron slowing down density was also calculated depending on the recent experimental t value and distance.
A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreThis study involves the investigation of the effect of nitrogen laser with 337.1 nm wavelength on the sensitivity of Staphylococcus aureus bacteria by using local therapeutic due to burns. Thirty six isolate of Staphylococcus aureus bacteria were isolated from 25 patients suffering from sever burns, each isolate of bacteria was irradiated with nitrogen laser at (5, 10, 15 and 30) pulses/second repetition rates for 1, 5, 10, 20 and 30 minutes for each repetition rate. The effects of nitrogen laser on the local therapeutics sensitivity of bacteria were obtained using Kirby Baur method. Changes in the sensitivity of bacteria to local therapeutics (Tetracyclin, Chloramphenicol, Flumizin and Fucidin) occur at high repetition rate(30 pulses/seco
... Show MoreThe research aimed to compare the performance of the commercial and the Islamic banks listed in the Palestinian's Stock Exchange .To achieve the objectives of the study we selected all the commercial and the Islamic banks listed in the Palestinian Stock Exchange to obtain the necessary data for the analysis process during the period of (2009-2013) .the comparison based on the performance indicators ( liquidity rate, profitability rate ,the activity rate and the market rate).
a statistical method was used to analyze the date to find the performance differences between the commercial banks,
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More<span lang="EN-US">The need for robotics systems has become an urgent necessity in various fields, especially in video surveillance and live broadcasting systems. The main goal of this work is to design and implement a rover robotic monitoring system based on raspberry pi 4 model B to control this overall system and display a live video by using a webcam (USB camera) as well as using you only look once algorithm-version five (YOLOv5) to detect, recognize and display objects in real-time. This deep learning algorithm is highly accurate and fast and is implemented by Python, OpenCV, PyTorch codes and the Context Object Detection Task (COCO) 2020 dataset. This robot can move in all directions and in different places especially in
... Show More