The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreThis research is devoted to investigate relationship between both Ultrasonic Pulse Velocity and Rebound Number (Hammer Test) with cube compressive strength and also to study the effect of steel reinforcement on these relationships.
A study was carried out on 32 scale model reinforced concrete elements. Non destructive testing campaign (mainly ultrasonic and rebound hammer tests) made on the same elements. About 72 concrete cubes (15 X 15 X15) were taken from the concrete mixes to check the compressive strength.. Data analyzed.Include the possible correlations between non destructive testing (NDT) and compressive strength (DT) Statistical approach is used for this purpose. A new relationships obtained from correlations results is give
In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.
Ischemic stroke is a significant cause of morbidity and mortality worldwide. Autophagy, a process of intracellular degradation, has been shown to play a crucial role in the pathogenesis of ischemic stroke. Long non-coding RNAs (lncRNAs) have emerged as essential regulators of autophagy in various diseases, including ischemic stroke. Recent studies have identified several lncRNAs that modulate autophagy in ischemic stroke, including MALAT1, MIAT, SNHG12, H19, AC136007. 2, C2dat2, MEG3, KCNQ1OT1, SNHG3, and RMRP. These lncRNAs regulate autophagy by interacting with key proteins involved in the autophagic process, such as Beclin-1, ATG7, and LC3. Understanding the role of lncRNAs in regulating auto
Machine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreABSTRACT Background: The Iraqi hospital witnessed numerous violence incidents against medical staff working in emergency department and range from verbal to physical violence. High frequency of these attacks urged the Iraqi doctors for migration. Aim of study: To identify the prevalence of workplace violence against medical staff and to and study the risk factors related to work place violence. Materials and methods: A descriptive cross sectional study carried out among a sample of 300 medical
Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method
... Show More