Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signal-noise ratio (PSNR), mean square error (MSE) and correlation) were conducted on a group of images to determine the strength and efficiency of the proposed method, and the result proves that the proposed method provided a good level of safety. The obtained results were compared with those of other methods, and the result of comparing confirms the superiority of the proposed method.
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreThe aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreBackground: Periodontal diseases are one of the major dental pathologies that affect human populations worldwide at high prevalence rates The term periodontal disease usually refers only to plaque related inflammatory disease of the dental supporting tissues. Mouth rinses which act as an anti-plaque agents mostly used as adjuncts to oral hygiene. Aims of the study: To Estimate and compare the effects of Aloe vera relative to chlorhexidine on the clinical periodontal parameters (plaque index, gingival index, bleeding on probing). Material and method: A total of 44 subjects with plaque-induced gingivitis, baseline of data were collected for (PLI, GI, and BOP) and underwent oral hygiene instruction, scaling and polishing, then divided into:
... Show MoreThis investigation was carried out to estimate the antiparasitic potential of silver and Chitosan nanoparticles loaded with spiramycin against toxoplasmosis infected. After mice injected intraperitoneal in a dose 103viable tachyzoites for acute infection; then treated with spiramycin, chitosan nanoparticles and silver nanoparticles as a single or combined therapy given for seven days. Peritoneal fluid examination revealed a significant decrease in the number of
This paper deals with constructing a model of fuzzy linear programming with application on fuels product of Dura- refinery , which consist of seven products that have direct effect ondaily consumption . After Building the model which consist of objective function represents the selling prices ofthe products and fuzzy productions constraints and fuzzy demand constraints addition to production requirements constraints , we used program of ( WIN QSB ) to find the optimal solution
in this paper fourth order kutta method has been used to find the numerical solution for different types of first liner
This research is concerned with the study of (the aesthetic of constructive relations in linear composition) with what distinguished Arabic calligraphy through the style and artistic method in its construction, and the specifications it carries that enabled it to pay attention to building formations to achieve in its total linear ranges aesthetic values and relationships. Through the research, the models and the exploratory study that he obtained, the researcher was able to raise the research problem in the first chapter according to the following question: What is the aesthetic of constructive relations in linear formation?
The importance of the research in achieving the aesthetics of the formations, which is a wide field according t