The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThis paper proposed a theoretical treatment to study underwater wireless optical communications (UWOC) system with different modulation schemes by multiple input-multiple output (MIMO) technology in coastal water. MIMO technology provides high-speed data rates with longer distance link. This technique employed to assess the system by BER, Q. factor and data rate under coastal water types. The reliability of the system is examined by the techniques of 1Tx/1Rx, 2Tx/2Rx, 3Tx/3Rx and 4Tx/4Rx. The results shows the proposed technique by MIMO can get the better performance compared with the other techniques in terms of BER. Theoretical results were obtained to compare between PIN and APD
In this study, we attempt to provide healthcare service to the pilgrims. This study describes how a multimedia courseware can be used in making the pilgrims aware of the common diseases that are present in Saudi Arabia during the pilgrimage. The multimedia courseware will also be used in providing some information about the symptoms of these diseases, and how each of them can be treated. The multimedia courseware contains a virtual representation of a hospital, some videos of actual cases of patients, and authentic learning activities intended to enhance health competencies during the pilgrimage. An examination of the courseware was conducted so as to study the manner in which the elements of the courseware are applied in real-time learn
... Show MoreBackground: The systemic host modulation therapy is new approach in treatment of periodontal diseases. Materials and methods:The target of this treatment is the host response to microbial infection because at present time,it is well known that most of damage found in periodontal diseases cause by the inflammatory -immune response to periodontal infections.Sub-antimicrobial-dose Doxycycline (SDD) is a 20-mg dose of Doxycycline (Periostat) that is approved and indicated as an adjunct to scaling and root planning (SRP) in the treatment of chronic periodontitis. Results:At present, SDD (Periostat) is the only systemically administered agent that is approved by the U.S. Food and Drug Administration (FDA) and accepted by the American Dental Asso
... Show MoreThe insurance Sector of important vessels saving that work on the accumulation of capitals which contribute to the financing of economic and social development plans of countries, in order to achieve of marketing superiority in presenting the insurance services it would require insurance companies focus their marketing efforts and increased interest in internal customer to recruitment new customers and keep of current customers, so the research aims to release the impact of the dimensions of the internal marketing of (the company's vision, training and development, incentive and, motivation, internal communication) in the dimensions of the marketing superiority (to keep the customer, service quality, customer satisfaction, customer, valu
... Show MoreA simple straightforward mathematical method has been developed to cluster grid nodes on a boundary segment of an arbitrary geometry that can be fitted by a relevant polynomial. The method of solution is accomplished in two steps. At the first step, the length of the boundary segment is evaluated by using the mean value theorem, then grids are clustered as desired, using relevant linear clustering functions. At the second step, as the coordinates cell nodes have been computed and the incremental distance between each two nodes has been evaluated, the original coordinate of each node is then computed utilizing the same fitted polynomial with the mean value theorem but reversibly.
The method is utilized to predict
... Show MoreIn this research design was treated gap laser mathematically and practically Bashaddam model Raasi simple and new and we have found that there is a good match in the practical and theoretical results
S Khalifa E, AH Khalil I, N Adil A, AB Razan A…, 2009