Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.
With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show MoreRecently, the phenomenon of the spread of fake news or misinformation in most fields has taken on a wide resonance in societies. Combating this phenomenon and detecting misleading information manually is rather boring, takes a long time, and impractical. It is therefore necessary to rely on the fields of artificial intelligence to solve this problem. As such, this study aims to use deep learning techniques to detect Arabic fake news based on Arabic dataset called the AraNews dataset. This dataset contains news articles covering multiple fields such as politics, economy, culture, sports and others. A Hybrid Deep Neural Network has been proposed to improve accuracy. This network focuses on the properties of both the Text-Convolution Neural
... Show MoreIn this paper a theoretical attempt is made to determine whether changes in the aorta diameter at different location along the aorta can be detected by brachial artery measurement. The aorta is divided into six main parts, each part with 4 lumps of 0.018m length. It is assumed that a desired section of the aorta has a radius change of 100,200, 500%. The results show that there is a significant change for part 2 (lumps 5-8) from the other parts. This indicates that the nearest position to the artery gives the significant change in the artery wave pressure while other parts of the aorta have a small effect.
This paper reports a numerical study of flow behaviors and natural convection heat transfer characteristics in an inclined open-ended square cavity filled with air. The cavity is formed by adiabatic top and bottom walls and partially heated vertical wall facing the opening. Governing equations in vorticity-stream function form are discretized via finite-difference method and are solved numerically by iterative successive under relaxation (SUR) technique. A computer program to solve mathematical model has been developed and written as a code for MATLAB software. Results in the form of streamlines, isotherms, and average Nusselt number, are obtained for a wide range of Rayleigh numbers 103-106 with Prandtl number 0.71
... Show MoreBackground: A minimally invasive antral membrane balloon elevation (MIAMBE) has been introduced to overcome the invasiveness of modified Caldwell-Luc (lateral approach) and the drawbacks of the osteotome (summers' technique) in maxillary sinus floor elevation surgery. Materials and methods: A total of 13 adult Iraqi patients aged 28-55 years, 4 males and 9 females underwent sinus floor elevation surgery via crestal approach by using sinus balloon technique. A panoramic radiograph and (Cone beam computed tomography (CBCT)/or medical CT scan) were obtained before and after surgery. Postoperative gained bone was assessed and the patient reactions including pain, nasal bleeding, and ecchymosis were recorded. The whole follow up period was 1yea
... Show MoreRecently, environmental noise has arisen from various sources, such as those from exhaust mufflers of combustion engines found in cars, trucks, or power generators, which produce significant noise during their operation. Controlling the radiated noise from these mufflers is a major factor in improving acoustic comfort and minimizing the impact on the surrounding communities. Numerous research has been presented for this reason by modification of the internal structure of the exhaust muffler. The main objective of this work is to reduce the noise level emitted from exhaust mufflers. This can be achieved by adjusting structure parameters to attenuate the surrounding environment's radiated noise. Analysis of pressure-wave propagation h
... Show MoreIn this paper, we establish the conditions of the occurrence of the local bifurcations, such as saddle node, transcritical and pitchfork, of all equilibrium points of an eco-epidemiological model consisting of a prey-predator model with SI (susceptible-infected) epidemic diseases in prey population only and a refuge-stage structure in the predators. It is observed that there is a transcritical bifurcation near the axial and free predator equilibrium points, near disease-free equilibrium point is a saddle-node bifurcation and near positive (coexistence) equilibrium point is a saddle-node bifurcation, a transcritical bifurcation and a pitchfork bifurcation. Further investigations for Hopf bifurcation near coexistence equilibrium point
... Show MoreThe aim of this study is to develop the science textbook for the 1st intermediate grade by analyzing it according to life skills. Its core areas were mental skills, environmental skills, and health skills. The analysis tool was used after verifying its validity and stability in analyzing the science textbook for the 1st intermediate grade, and the results of the study resulted in the inclusion of mental skills on a high percentage of repetitions, while we find that this percentage is low in the inclusion of environmental and health skills. The study recommended the importance of achieving balance and justice in including skills in the science textbook for the 1st intermediate grade, by emphasizing the environmental and health skills by incr
... Show More