A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show MoreNumerous tests are recently conducted to assess vibration's role in accelerating the heat transfer rate in various heat exchangers. In this work, the enhancement of heat transfer by the effect of transfer vibration and inclination angles on the surface of a double pipe heat exchanger experimentally has been investigated. A data acquisition system is applied to record the data of temperatures, flow rates, and frequencies over the tests. A compound technique was adopted, including the application of a set of inclination angles of (0°, 10°, 20°, and 30°) under the effect of frequency of vibration ranging from sub-resonance to over-resonance frequencies. The results showed that the overall heat transfer coefficient enhan
... Show MorePulsatile drug delivery systems are time-controlled dosage forms which are designed to release the active pharmaceutical ingredient after a predetermined lag time to synchronize the disease circadian rhythm. A migraine shows circadian rhythm with a marked increase in attacks between 6 a.m. and 8 a.m.
Sumatriptan is a selective agonist at serotonin (5-Hydroxy tryptamine1 (5-HT1))receptors, is an effective treatment for acute migraine attacks.
The aim of this work is to prepare time-controlled press-coated tablet with a lag time of 5.45 hrs.
Six formulas of fast dissolving core tablets and three formulas of press-coated tablets were prepared by using direct compression method using different variables to prepa
... Show MoreThe Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se
... Show MoreMedical Ultrasound (US) has many features that make it widely used in the world. These features are safety, availability and low cost. However, despite these features, the ultrasound suffers from problems. These problems are speckle noise and artifacts. In this paper, a new method is proposed to improve US images by removing speckle noise and reducing artifacts to enhance the contrast of the image. The proposed method involves algorithms for image preprocessing and segmentation. A median filter is used to smooth the image in the pre-processing. Additionally, to obtain best results, applying median filter with different kernel values. We take the better output of the median filter and feed it into the Gaussian filter, which then
... Show MoreUltrasound imaging has some problems with image properties output. These affects the specialist decision. Ultrasound noise type is the speckle noise which has a grainy pattern depending on the signal. There are two parts of this study. The first part is the enhancing of images with adaptive Weiner, Lee, Gamma and Frost filters with 3x3, 5x5, and 7x7 sliding windows. The evaluated process was achieved using signal to noise ratio (SNR), peak signal to noise ratio (PSNR), mean square error (MSE), and maximum difference (MD) criteria. The second part consists of simulating noise in a standard image (Lina image) by adding different percentage of speckle noise from 0.01 to 0.06. The supervised classification based minimum di
... Show MoreThis paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreBackground: Newly developed vessels sealing device built upon bipolar diathermy technology had a great
impact on facilitating advances laparoscopic surgery. Laparoscopic splenectomy is well established procedure
but in this study the procedure is totally based on bipolar vessel sealing system in devascularization of the
spleen.
Objective: To evaluate the safety of laparoscopic splenectomy with vessels sealing device and its
outcome.
Patient and method: Prospective study conducted in Baghdad Teaching Hospital and Dijlah private hospital
from October 2009 to October 2013. Thirty patients with idiopathic thrombocytopenic purpura(ITP) were
included and had laparoscopic splenectomy . The adapted procedure was stapleles
Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.