A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreIn this study, the flow and heat transfer characteristics of Al2O3-water nanofluids for a range of the Reynolds number of 3000, 4500, 6000 and 7500 with a range of volume concentration of 1%, 2%, 3% and 4% are studied numerically. The test rig consists of cold liquid loop, hot liquid loop and the test section which is counter flow double pipe heat exchanger with 1m length. The inner tube is made of smooth copper with diameter of 15mm. The outer tube is made of smooth copper with diameter of 50mm. The hot liquid flows through the outer tube and the cold liquid (or nanofluid) flow through the inner tube. The boundary condition of this study is thermally insulated the outer wall with uniform velocity a
... Show MoreFinding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith
... Show MoreFounding a System to secure deposits and protecting the depositors is considered one of the important and exchanged subjects out there in the banking system/field in Iraq at the current time, and the reason behind the exchange and spread of this subject is due to the financial crisis of which the banking sector is suffering from and the stumbling of many banks, those factors have had led to the insecurity of the depositors and their mistrust towards banks, thus, it is necessary to create a system to secure deposits in which depositors would be compensated for the losses caused by the banks' failures. in addition, it could be a countermeasure system which maintains the banking stability, protects the rights of depositors and gains
... Show MoreIn this research, an enhancement in lubricating, rheological, and filtration properties of unweighted water-based mud is fundamentally investigated using XC polymer NPs with 0.2gm, 0.5gm, 1gm, 2gm, and 4gm concentrations. Bentonite, that had been used in the preparation of unweighted water-based mud, was characterized using XRF-1800 Sequential X-ray Fluorescence Spectrometer, XRD-6100/7000 X-ray Diffractometer, and Malvern Mastersizer 2000 particle size analyzer, respectively. Lubricating, rheology and filtration properties of unweighted water-based mud were measured at room temperature (35°C) using OFITE EP and Lubricity Tester, OFITE Model 900 Viscometer, and OFITE Low-Pressure Filter Press, respectively. XC Polymer N
... Show MoreAbstract
Objective: the idea of this study to improve transdermal permeability of Methotrexate using eucalyptus oil, olive oil and peppermint oil as enhancers.
Method: eucalyptus oil (2% and 4%), peppermint oil (2% and 4%) and olive oil (2% and 4%) all used as natural enhancers to develop transdermal permeability of Methotrexate via gel formulation. The gel was subjected to many physiochemical properties tests. In-vitro release and permeability studies for the drug were done by Franz cell diffusion across synthetic membrane, kinetic model was studied via korsmeyer- peppas equation.
Result: the results demonstrate that safe, nonirritant or cause necrosis to rats' skin and stable till 60 days gel was successfully formulated.<
The expanding use of multi-processor supercomputers has made a significant impact on the speed and size of many problems. The adaptation of standard Message Passing Interface protocol (MPI) has enabled programmers to write portable and efficient codes across a wide variety of parallel architectures. Sorting is one of the most common operations performed by a computer. Because sorted data are easier to manipulate than randomly ordered data, many algorithms require sorted data. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. In this paper, sequential sorting algorithms, the parallel implementation of man
... Show MoreIn this paper, we applied the concept of the error analysis using the linearization method and new condition numbers constituting optimal bounds in appraisals of the possible errors. Evaluations of finite continued fractions, computations of determinates of tridiagonal systems, of determinates of second order and a "fast" complex multiplication. As in Horner's scheme, present rounding error analysis of product and summation algorithms. The error estimates are tested by numerical examples. The executed program for calculation is "MATLAB 7" from the website "Mathworks.com
Thermal energy storage is an important component in energy units to decrease the gap between energy supply and demand. Free convection and the locations of the tubes carrying the heat-transfer fluid (HTF) have a significant influence on both the energy discharging potential and the buoyancy effect during the solidification mode. In the present study, the impact of the tube position was examined during the discharging process. Liquid-fraction evolution and energy removal rate with thermo-fluid contour profiles were used to examine the performance of the unit. Heat exchanger tubes are proposed with different numbers and positions in the unit for various cases including uniform and non-uniform tubes distribution. The results show that
... Show MoreThe solidification process in a multi-tube latent heat energy system is affected by the natural convection and the arrangement of heat exchanger tubes, which changes the buoyancy effect as well. In the current work, the effect of the arrangement of the tubes in a multi-tube heat exchanger was examined during the solidification process with the focus on the natural convection effects inside the phase change material (PCM). The behavior of the system was numerically analyzed using liquid fraction and energy released, as well as temperature, velocity and streamline profiles for different studied cases. The arrangement of the tubes, considering seven pipes in the symmetrical condition, are assumed at different positions in the system, i
... Show More