Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
This paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreIn this communication, introduce the split Mersenne and Mersenne-Lucas hybrid quaternions, also obtaining generating functions and Binet formulas for these hybrid quaternions and investigating some properties among them.
Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-
... Show MoreThe aerodynamic and elastic forces may cause an oscillation of the structure such as the high frequency of the airfoil surfaces and the dynamic instability occurring in an aircraft in flight and failure may occur at a speed called flutter speed. In this work, analytical and numerical investigations of flutter limits of thin plates have been carried out. The flutter speed of rectangular plates were obtained and compared with some published results. Different design parameters were investigated such as aspect ratio, thickness and their effects on flutter velocity. It was found that the structural mode shape plays an important role in the determination of the flutter speed and the coupling between the bending and torsional mode is the main
... Show MoreEvery era characterizes with its thought and life philosophy , where Muslims left behind them educational and intellectual heritage we should proud of it because it reflects the image of past and lights the way of present and future path where we should make use of it to fit with our statuesque and contemporary issues because we don’t know about it but little as result of ignorance or imitation of the western culture.
It’s wrong to regard heritage from the past but aphasia of Islamic and Arab genies that its roots tracing back to past and extending to future .
Islamic Arab educational thought regards one of the ric
... Show MoreThe researcher of human history finds that the first social relations on earth were represented by the violence of Adam, peace be upon him, Cain and Abel. Violence has been a phenomenon of life and society. The history of history is full of all forms of violence and its forms. It speaks of cruelty, oppression and states. History began, in some of its chapters, written with the blood of the victims. It is a testimony to the cruelty of human beings. His human nature and his sin have played a major role that can not be overlooked in the development of important and fundamental developments in some historical turning points where violence was a necessity for life, and its launching change, renewal and reform, and major revolutions in human h
... Show MoreThe best proximity point is a generalization of a fixed point that is beneficial when the contraction map is not a self-map. On other hand, best approximation theorems offer an approximate solution to the fixed point equation . It is used to solve the problem in order to come up with a good approximation. This paper's main purpose is to introduce new types of proximal contraction for nonself mappings in fuzzy normed space and then proved the best proximity point theorem for these mappings. At first, the definition of fuzzy normed space is given. Then the notions of the best proximity point and - proximal admissible in the context of fuzzy normed space are presented. The notion of α ̃–ψ ̃- proximal contractive mapping is introduced.
... Show Moreالتعددية الثقافية هي مفهوم يتعلق بالمجتمعات التي تضم ثقافات عده، أو العالم الذي يتضمن ثقافات متنوعة؛ فالتعددية هي التنوع الثقافي والفكري؛ وبالتالي هي عنصر إثراء للإنسانية وأساس لوجودها؛ فالتعددية الثقافية تتضمن القبول بالثقافات والافكار الانسانية كلها، وإفساح المجال أمامها للمشاركة في بنا ء الثقافة والفكر العالمي؛ وهكذا فإنها تتمثل في التسامح مع الثقافات والافكار المختلفة الاعتراف بالهويات والخصوصيات
... Show MoreBased on Lyapunov exponent criterion, the aircraft lateral-directional stability during critical flight cases is presented. A periodic motion or limit cycle oscillation isdisplayed. A candidate mechanism for the wing rock limit cycle is the inertia coupling between an unstable lateral-directional (Dutch roll) mode with stable longitudinal (short period) mode. The coupling mechanism is provided by the nonlinear interaction of motion related terms in the complete set equations of motion. To analyze the state variables of the system, the complete set of nonlinear equations of motion at different high angles of attack are solved. A novel analysis including the variation of roll angle as a function of angle of attack is proposed. Furthermore
... Show More