A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreThe combined system of electrocoagulation (EC) and electro-oxidation (EO) is one of the most promising methods in dye removal. In this work, a solution of 200 mg/l of Congo red was used to examine the removal of anionic dye using an EC-EO system with three stainless steel electrodes as the auxiliary electrodes and an aluminum electrode as anode for the EC process, Cu-Mn-Ni Nanocomposite as anode for the EO process. This composite oxide was simultaneously synthesized by anodic and cathodic deposition of Cu (NO3)2, MnCl2, and Ni (NO3)2 salts with 0.075 M as concentrations of each salt with a fixed molar ratio (1:1:1) at a constant current density of 25 mA/cm2. The characteristics structure and surface morphology of the depo
... Show MoreThe pure ZnS and ZnS-Gr nanocomposite have been prepared
successfully by a novel method using chemical co-precipitation. Also
conductive polymer PPy nanotubes and ZnS-PPy nanocomposite
have been synthesized successfully by chemical route. The effect of
graphene on the characterization of ZnS has been investigated. X-ray
diffraction (XRD) study confirmed the formation of cubic and
hexagonal structure of ZnS-Gr. Dc-conductivity proves that ZnS and
ZnS-Gr have semiconductor behavior. The SEM proved that
formation of PPy nanotubes and the Gr nanosheet. The sensing
properties of ZnS-PPy/ZnS-Gr for NO2 gas was investigated as a
function of operating temperature and time under optimal condition.
The sensitivity,
A laboratory investigation of six different tests were conducted on silty clay soil spiked with lead in concentrations of 1500 mg/kg. A constant DC voltage gradient of 1 V/cm was applied for all these tests with duration of 7 days remediation process for each test. Different purging solutions and addition configurations, i.e. injection wells, were investigated experimentally to enhance the removal of lead from Iraqi soil during electro-kinetic remediation process. The experimental results showed that the overall removal efficiency of lead for tests conducted with distilled water, 0.1 M acetic acid, 0.2 M EDTA and 1 M ammonium citrate as the purging solutions were equal to 18 %, 37 %, 42 %, and 29 %, respectively. H
... Show MoreBy optimizing the efficiency of a modular simulation model of the PV module structure by genetic algorithm, under several weather conditions, as a portion of recognizing the ideal plan of a Near Zero Energy Household (NZEH), an ideal life cycle cost can be performed. The optimum design from combinations of NZEH-variable designs, are construction positioning, window-to-wall proportion, and glazing categories, which will help maximize the energy created by photovoltaic panels. Comprehensive simulation technique and modeling are utilized in the solar module I-V and for P-V output power. Both of them are constructed on the famous five-parameter model. In addition, the efficiency of the PV panel is established by the genetic algorithm
... Show MoreThis work describes the enhancement of phenol red decolorization through immobilizing of laccase in chitosan and enzyme recycling. Commercial laccase from white rot fungus, Trametesversicolor (Tvlac), was immobilizedin to freshly prepared chitosan beads by using glutaraldehyde as a cross linker. Characterization of prepared chitosan was confirmed by FTIR and scanning electron microscope (SEM). Tvlac (46.2 U/mL) immobilized into chitosan beads at 0.8 % glutaraldehyde (v/v) within 24 hrs. Synthetic (HBT) and natural (vanillin) mediators were used to enhance dye decolorizoation. It was found that 89 % of phenol red was decolorized by chitosan beads within 180 min. in the absence of enzyme and mediator, while decolorization percenta
... Show MoreIn this paper a comparison of the experimental of evacuated tube solar water heater systems with and without mirror flat reflector. The aim of using the reflector to improve thermal efficiency, and the data gathered which are (temperature, solar irradiation and time) for three days were compared. the results from compared data the temperature lower increase in evacuated tube solar water heater system without reflector than the temperature increase in evacuated tube solar water heater system with reflector .The results show (53, 39, 35) % for three days respectively that the evacuated tube solar water heater system with reflector has higher thermal efficiencies than the results (47, 28, 30) % for three days respectively thermal efficiencies
... Show MoreTo expedite the learning process, a group of algorithms known as parallel machine learning algorithmscan be executed simultaneously on several computers or processors. As data grows in both size andcomplexity, and as businesses seek efficient ways to mine that data for insights, algorithms like thesewill become increasingly crucial. Data parallelism, model parallelism, and hybrid techniques are justsome of the methods described in this article for speeding up machine learning algorithms. We alsocover the benefits and threats associated with parallel machine learning, such as data splitting,communication, and scalability. We compare how well various methods perform on a variety ofmachine learning tasks and datasets, and we talk abo
... Show More—Medical images have recently played a significant role in the diagnosis and detection of various diseases. Medical imaging can provide a means of direct visualization to observe through the human body and notice the small anatomical change and biological processes associated by different biological and physical parameters. To achieve a more accurate and reliable diagnosis, nowadays, varieties of computer aided detection (CAD) and computer-aided diagnosis (CADx) approaches have been established to help interpretation of the medical images. The CAD has become among the many major research subjects in diagnostic radiology and medical imaging. In this work we study the improvement in accuracy of detection of CAD system when comb
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show More