A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. The approach has been employed to use Fuzzy C-Mean clustering (FCM) to find the robust image regions for hiding the type of skin texture features in mice. The steganography was implemented using Least Significant Bit (LSB) method.
Will address this research interaction and coordination between fiscal and monetary policies and the impact of this interaction and coordination on economic stability and growth، and how the financial implications of monetary policy may stimulate action monetary policy and treatment side effects and the nature of responsiveness and bounce between procedures both two policies and their impact on the balance of overall economic and explained in the folds of searchjustifications coordination and the extent necessary in order to address the imbalances in economic activity through twinning actions of monetary and fiscal، has embodied this coordination and interaction between policies and their impact m
... Show MoreThe study of the validity and probability of failure in solids and structures is highly considered as one of the most incredibly-highlighted study fields in many science and engineering applications, the design analysts must therefore seek to investigate the points where the failing strains may be occurred, the probabilities of which these strains can cause the existing cracks to propagate through the fractured medium considered, and thereafter the solutions by which the analysts can adopt the approachable techniques to reduce/arrest these propagating cracks.In the present study a theoretical investigation upon simply-supported thin plates having surface cracks within their structure is to be accomplished, and the applied impact load to the
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe purpose of this paper is to apply styrene butadiene rubber (SBR) as virgin alongside expanded polystyrene (EPS) resin as a recycled polymer after consumption in the presence of bagasse fibers (BF) as biomass source derived from sugarcane in different concentrations to reinforce this polymeric matrix to form affordable composites that can be used in manufacturing low-cost and sustainable car interior-trim constituents.
SBR and EPS represent an example for thermoplastic elastomers (
Analysis system of sports players is very important for individuals in weightlifting. Assessment of player and strength is important for the performance of weightlifting. This paper proposes an analytical method for weightlifters with check-by-frame video. This analysis system can compute the major steps of seven positions in both snatch and clean and jerk methods in frame-video weightlifting monitoring of movements. Each user can compute the major steps of the seven positions of Hu moments among two frames in the video during training, and the Euclidian distance can be computed for the Hu moment values and lifting moment values in the snatch and clean and jerk methods during training. The outcome of the proposed system shows on efficien
... Show MoreRecently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show MoreIn this work, a Photonic Crystal Fiber (PCF) sensor based on the Surface Plasmon Resonance (SPR) technology was proposed. A thin layer of gold (Au) was deposited on a D-shaped Photonic Crystal Fiber (PCF), which was coated with plasmonic chemically stable gold material with a thickness of 40nm. The performance parameters like sensitivity including wavelength sensitivity and amplitude sensitivity and resolution were evaluated by simulation using COMSOL software. The proposed sensor was created by using the finite element approach, it is numerically examined. The results show that the surface of D-shaped Photonic Crystal Fiber coated with Au behaves as a sensor to detect the refractive index (IR) of toxic metal ions. The impacts of the str
... Show MoreIn light of the increasing interest in Child-rearing in nurseries and kindergartens and the most important experiences gained by the child at this stage that form the basis for the subsequent stages of her/his physical mental and social growth.
The significance of the research concentrates the need to asses the affecting variables on the child growth to create opportunities for her/him to have intact rearing.
The research also aims to classify these variables at each age level and highlight its moral role.
The problem of the research is the lack of clarity of different variables impact of the child growth in different age levels in nurseries and kindergart
... Show Morethe researchers Sought to determine the impact of the customer contact (Within a client contact there are two times, first is the total time required to create a service and within it there is contact time while the second time is the time of client contact ؛ where means a time that records the physical presence of the customer during the process of service) on operations performance by concentrate attention on the cost (labor productivity) and quality (patient ratio to the doctor) and speed (cycle time) and flexibility (the flexibility range) , as well as ruling out variable of innovation because of impossibility to measure this variable in the Specialty Center for Dental in al-alwia due to the center is lacking of mechanisms t
... Show MoreGiven the growing interest in digital marketing operations and the technology imposed by the reality in which both companies and their customers are affected, the researchers attempted to shed light on the reality and challenges of digital marketing from the faculty members viewpoint at Jouf university, the problem is that technology has imposed a new reality that has resulted in a major change in behavioral patterns of customers with a number of obstacles and challenges confronted customers in digital marketing, it is expected that the outcomes of this study help companies in overcoming the obstacles that prevent the desire and ability of the customer to change his behavioral style to deal with electronic shopping operations and
... Show More