Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
Toxoplasmosis is a parasitic infection that triggers immune cells to produce cytokines and inflammatory mediators that are responsible for abnormal or aborted immune responses. This study highlights the evaluation of the Dectin-1 receptor and cytokine IL-37 in the serum of 80 patients who had miscarried in the first trimester and were infected with toxoplasmosis, as well as 40 pregnant women in the first trimester who had a successful pregnancy (control groups). The serum was first screened for the T. gondii IgM and IgG antibodies by an enzyme-linked immunosorbent assay (ELISA) and then the serum levels of IL-37 and Dectin-1 were determined. The results showed that the serum level of Dectin-1 was significantly increased in anti-
... Show MoreObesity is a risk factor for a number of chronic conditions. Obesity is clinically defined using the body mass index (BMI) as weight in kg divided by (height)2 in m2 correlated with obesity. Currently, genetic markers of obesity are being studied. This study focused on the association between the angiotensin II receptor AGTR1 gene (A1166C) and fat mass and obesity-associated protein also known as alpha-ketoglutarate-dependent dioxygenase (FTO) (rs9939609) in obese children and adolescents patients in Rostov region, Russia. Five-hundreds of Russian nationality child and adolescent were recruited for the obesity-control studies. The relationship between the A1166C polymorphism of the AGTR1 gene in
... Show MoreThe research aims to Applied Study in the nature of the impact of information asymmetry for brokerage firms in the common stock trading, The research included the theoretical concepts associated with each of the brokerage firms ,information asymmetry and common stock trading, It used the financial methods on the practical side of the information asymmetry for brokerage firms based in the sector as well as trading volume and spread for common stock , The community of the research included the Iraq Stock Exchange,the sample of research the companies listed which have been trading on its stock for the period August 2015 until December 2015 as well as brokerage firms
amounting to 47 brokerage firm. The resea
... Show MoreLive the present companies in a competitive business environment going on and try to achieve excellence in their industry through the marketing of their products and achieve greater market share as possible to ensure its continued existence, and perhaps the concept of time production, which confirms, in essence, on the need to reduce inventory to a minimum in the production process as well as the concept of the marketing information system which asserts, in essence, to document all the events that are related to the marketing of the product provided by the production process, together constitute the subject deserves research and investigation as they have raised well-known in the fields of production management and marketing management.
... Show MoreDensity functional theory (DFT) with B3LYP level and 6-311G[Formula: see text] basis sets for light atoms like N and O and SDD basis sets for heavy atoms like Sn is used to examine the interaction of tin dioxide nanocrystals with nitrogen dioxide as a function of temperature from 273[Formula: see text]K to 373[Formula: see text]K through a Gaussian 09W software program. Gibbs free energy, enthalpy, and entropy of activation and reaction are calculated. The situation of transition of SnO2 clusters toward nitrogen dioxide is investigated. According to the findings, the activation energy of SnO2 clusters with nitrogen dioxide increases as the temperature rises (in negative value). Gauss view 0
... Show MoreThe combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.
In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.
&n
... Show MoreMelanoidins can be diagnosed using the Fourier transform infrared (FTIR) technique. UV/Vis is an effective tool for both qualitative and quantitative analysis of chemical components in melanoidin polymers. The structural and vibrational features of melanoidin synthesized from D-glucose and D-fructose are identical, according to FTIR spectra, with the only difference being the intensity of bands. Using FTIR spectra, the skeleton of melanoidin is divided into seven major regions. The existence of the C=C, C=N, and C=O groups in all melanoidins formed from fructose and glucose with ammonia is confirmed by the areas ranging from 1600 to 1690 cm-1, and the band is largely evident as a broad shoulder. Both melan
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreThe purpose of the current research is to identify the reality and applicability of the entrepreneurial approach in its dimensions (creative, proactive, independent, risk tolerant, offensive) and its impact on the success factors of the project (organizational commitment, communication, project team, project monitoring) Access to information, treatment, storage), which is a significant and important link in the success and development of industrial projects with the possibility of studying and analyzing the provision of the appropriate environment for this.
the research started from a problem expressed by a number of intellectual and practical questions aimed at answering them as well as To answer a
... Show More