<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreBackground: Inflammation of the brain parenchyma brought on by a virus is known as viral encephalitis. It coexists frequently with viral meningitis and is the most prevalent kind of encephalitis. Objectives: To throw light on viral encephalitis, its types, epidemiology, symptoms and complications. Results: Although it can affect people of all ages, viral infections are the most prevalent cause of viral encephalitis, which is typically seen in young children and old people. Arboviruses, rhabdoviruses, enteroviruses, herpesviruses, retroviruses, orthomyxoviruses, orthopneumoviruses, and coronaviruses are just a few of the viruses that have been known to cause encephalitis. Conclusion: As new viruses emerge, diagnostic techniques advan
... Show MoreIntroduction and Aim: Cancers are a complex group of genetic illnesses that develop through multistep, mutagenic processes which can invade or spread throughout the body. Recent advances in cancer treatment involve oncolytic viruses to infect and destroy cancer cells. The Newcastle disease virus (NDV), an oncolytic virus has shown to have anti-cancer effects either directly by lysing cancer cells or indirectly by activating the immune system. The green fluorescent protein (GFP) has been widely used in studying the anti-tumor activity of oncolytic viruses. This study aimed to study the anticancer effect of a recombinant rNDV-GFP clone on NCI-H727 lung carcinoma cell line in vitro. Materials and Methods: The GFP gene was inserted t
... Show MoreIntroduction and Aim: Cancers are a complex group of genetic illnesses that develop through multistep, mutagenic processes which can invade or spread throughout the body. Recent advances in cancer treatment involve oncolytic viruses to infect and destroy cancer cells. The Newcastle disease virus (NDV), an oncolytic virus has shown to have anti-cancer effects either directly by lysing cancer cells or indirectly by activating the immune system. The green fluorescent protein (GFP) has been widely used in studying the anti-tumor activity of oncolytic viruses. This study aimed to study the anticancer effect of a recombinant rNDV-GFP clone on NCI-H727 lung carcinoma cell line in vitro. Materials and Methods: The GFP gene was inserted t
... Show MoreThe aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive
... Show MoreDigital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreThe unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show More