Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreIn recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho
... Show Moretock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.
Abstract: Background: Staphylococcus aureus is Gram-positive bacteria that lives as a normal flora in living organisms but can be pathogenic to humans. Although a relatively unspectacular, nonmotile coccoid bacterium, S. aureus is a dangerous human pathogen in both community-acquired and nosocomial infections. Due to the increasing emergence of new strains of this antibiotic-resistant bacteria, it has become essential to approach different methods to control this pathogen. One of these methods is the antimicrobial photodynamic inactivation process using a low-level laser, in this paper, the Photodynamic effects of Rose Bengal and LLLL on the virulence factors of S.aureus were evaluated.
Background: Prophylaxis methods are used to mechanically remove plaque and stain from tooth surfaces; such methods give rise to loss of superficial structure and roughen the surface of composites as a result of their abrasive action. This study was done to assess the effect of three polishing systems on surface texture of new anterior composites after storage in artificial saliva. Materials and methods: A total of 40 Giomer and Tetric®N-Ceram composite discs of 12 mm internal diameter and 3mm height were prepared using a specially designed cylindrical mold and were stored in artificial saliva for one month and then samples were divided into four groups according to surface treatment: Group A (control group):10 specimens received no surfa
... Show MoreThis study presents the debonding propagation in single NiTi wire shape memory alloy into linear low-density polyethylene matrix composite the study of using the pull-out test. The aim of this study is to investigate the pull-out tests to check the interfacial strength of the polymer composite in two cases, with activation NiTinol wire and without activation. In this study, shape memory alloy NiTinol wire 2 mm diameter and linear fully annealed straight shape were used. The study involved experimental and finite element analysis and eventually comparison between them. This pull-out test is considered a substantial test because its results have a relation with behavior of smart composite materials. The pull-out test was carried out by a u
... Show MoreThe effect of some environment faetor (different temperature and relative humidity) on the biology of the old world- screw worm, were studied under laboratory condition, the result showed that non of the eggs hatched at 15°c and under dried eondition which relative humidity between 20-40%, also result showed that the mature larvae needs one days to become pupa since it leaves the larval died at the temperature ranged between 25-40°C at different humidity rates. While it needs 3 days under lower temperature and different humidity to become pu^, on the other hand the results showed that either low temperature and dried condition or high temperature at different humidity rates cause non of pupa became adult. While low temperature (15-20) °c
... Show More