A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. The approach has been employed to use Fuzzy C-Mean clustering (FCM) to find the robust image regions for hiding the type of skin texture features in mice. The steganography was implemented using Least Significant Bit (LSB) method.
Background:Fractures of patella constitute 1% of all fractures. Various techniques have been described for internal fixation of patella fractures. Superiority of one technique over the other has long been debated. Objective:We reviewed a series of seventy patients with transverse or comminuted fractures of patella treated with cerclage and tension band wiring technique to assess if it had any advantages over k. wires and tension band wiring technique. Type of the study:Retrospective study.Methods; Seventy patients with displaced patella fracture, with a mean age of 47 years (range 13-75) were divided into two groups :group A 36 patients were treated with cerclageand tensi
... Show MoreBackground: Fractures of patella constitute 1% of all fractures. Various techniques have been described for internal fixation of patella fractures. Superiority of one technique over the other has long been debated. Objective: We reviewed a series of seventy patients with transverse or comminuted fractures of patella treated with cerclage and tension band wiring technique to assess if it had any advantages over k. wires and tension band wiring technique. Type of the study: Retrospective study. Methods; Seventy patients with displaced patella fracture, with a mean age of 47 years (range 13-75) were divided into two groups :group A 36 patients were treated with cerclage and tension bands technique ,and group B 34 patients were fixed by 2 K.
... Show MoreThe history of civilizations in the past centuries is a rich source for creativity and inspiration in all areas of art and design, especially in the field of fashion design. Many designers draw their designs from previous eras; which is the aim of this research as we propose designing fashion the mannequin for the category of young girls aged between (10-18). The costumes were inspired by Victorian women's costumes during the time period (1860-1890) and were subdivided into three time periods (1860-1870), (1870-1880), (1880-1890) forming three designs for each time period , analyzing the nine designs to achieve the creative , functional and aesthetic aspects that are appropriate for the age group (research sample). The importance of the
... Show MoreSecurity concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad
... Show MoreThis study compared in vitro the microleakage of a new low shrink silorane-based posterior composite (Filtek™ P90) and two methacrylate-based composites: a packable posterior composite (Filtek™ P60) and a nanofill composite (Filtek™ Supreme XT) through dye penetration test. Thirty sound human upper premolars were used in this study. Standardized class V cavities were prepared at the buccal surface of each tooth. The teeth were then divided into three groups of ten teeth each: (Group 1: restored with Filtek™ P90, Group 2: restored with Filtek™ P60, and Group 3: restored with Filtek™ Supreme XT). Each composite system was used according to the manufacturer's instructions with their corresponding adhesive systems. The teeth were th
... Show MoreIn this research The study of Multi-level model (partial pooling model) we consider The partial pooling model which is one Multi-level models and one of the Most important models and extensive use and application in the analysis of the data .This Model characterized by the fact that the treatments take hierarchical or structural Form, in this partial pooling models, Full Maximum likelihood FML was used to estimated parameters of partial pooling models (fixed and random ), comparison between the preference of these Models, The application was on the Suspended Dust data in Iraq, The data were for four and a half years .Eight stations were selected randomly among the stations in Iraq. We use Akaik′s Informa
... Show MoreA modified Leslie-Gower predator-prey model with a Beddington-DeAngelis functional response is proposed and studied. The purpose is to examine the effects of fear and quadratic fixed effort harvesting on the system's dynamic behavior. The model's qualitative properties, such as local equilibria stability, permanence, and global stability, are examined. The analysis of local bifurcation has been studied. It is discovered that the system experiences a saddle-node bifurcation at the survival equilibrium point whereas a transcritical bifurcation occurs at the boundary equilibrium point. Additionally established are the prerequisites for Hopf bifurcation existence. Finally, using MATLAB, a numerical investigation is conducted to verify the va
... Show MoreThis article proposes a new strategy based on a hybrid method that combines the gravitational search algorithm (GSA) with the bat algorithm (BAT) to solve a single-objective optimization problem. It first runs GSA, followed by BAT as the second step. The proposed approach relies on a parameter between 0 and 1 to address the problem of falling into local research because the lack of a local search mechanism increases intensity search, whereas diversity remains high and easily falls into the local optimum. The improvement is equivalent to the speed of the original BAT. Access speed is increased for the best solution. All solutions in the population are updated before the end of the operation of the proposed algorithm. The diversification f
... Show More