Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
The research aims to monitor and analyze the visual and symbolic features, derived from the Omani heritage, and inspired by the concept of local identity, for a selection of contemporary Omani graphic art works, which represent a mixed, multi-category of research sample, comprising three levels: the works of professional Omani artists, and the works of young artists and specialized students, as well as the work of a number of active academics in the field of graphic theorizing and teaching. The sample is also divided - in terms of technical classification - into a category of works executed using traditional engraving and printing media, and a category of works executed using modern and digital graphic printing media.
Through the da
Trimethoprim derivative Schiff bases are versatile ligands synthesized with carbonyl groups from the condensation of primary amines (amino acids). Because of their broad range of biological activity, these compounds are very important in the medical and pharmaceutical fields. Biological activities such as antibacterial, antifungal and antitumor activity are often seen. Transition metal complexes derived from biological activity Schiff base ligands have been commonly used.
From a health standpoint, fluoride (F) is a vital element for humans. It had harmful effects on numerous organs when consumed in high dosages. Fluoride poisoning has been linked to liver damage. The purpose of this study was to see how sodium fluoride (Naf) affected liver function and the glycemic index in adult male albino rats. Fourteen (14) adult male Wistar albino rats were randomly and evenly divided into two groups and given the following treatments for thirty (30) days: G1 Group (Control group), were given distilled water and fed a balanced diet, G2 rats were administered water that contained 100 ppm Naf. The animals were fasted for 8-12 hours before being anesthetized and blood samples were taken by heart puncture technique
... Show MoreThe Legend between reality and its future Treatment in threatre analytics study
This research deals with shedding light on the issue of the poor understanding of students of Islamic sciences colleges for the subject of modern sciences; their causes and treatment, and it started with an introduction and an introductory research; The general weakness of the level of students of colleges of Islamic sciences in this article, and I detailed these reasons that relate to: the curriculum, the teaching staff, and students, and then concluded it with proposals and recommendations that would address this weakness.
A total of 228 domestic and wild animals, including sheep, goats, cows, buffaloes, camels, horses, donkeys, dogs, cats, wild hares, Asiatic jackals, and red foxes were examined for ixodid ticks in the central region of Iraq. Nine species of ixodid ticks belong to two genera namely Hyalomma anatolicum Koch, 1844, H. excavatum Koch, 1844, H. turanicum Pomerantsef, 1946, H. scupense Delpy, 1946, H. dromedarii Koch, 1844, H. schulzei Olenev, 1931, Rhipicephalus annulatus (Say, 1821), R. turanicus Pomerantsef & al., 1940 and R. leporis Pomerantsef, 1946 were recovered. Their distribution among hosts and infestation rates were di
... Show MoreThe aim of study to evaluated cinnamic acid and its activity on complete blood count(RBC,WBC,HG,HCV,MCH,MCHC and Plat.)and removed the cytoxan damage which caused bone marrow failure and leukemia and other that due to linked the cytoxan in 7- nitrogen of guanine based of DNA that lead to dead cells. Two concentration from pure cinnamic acid (5.6, 2.8 mg ? mice weight) in first step to choice the perfect concentration in comparison with each negative control ,positive control of cytoxan and the comparison group represent vitamin C. The second step to understand cinnamic acid mechanism activity towards cytoxan by used pre- cytoxan and post – cytoxan in interaction with perfect concentration of cinnamic acid dose (2.8 mg ? mice we
... Show MoreThis study highlights the problems of translating Shakespeare's food and drink-related insults (henceforth FDRIs) in (Henry IV, Parts I&II) into Arabic. It adopts (Vinay & Darbelnet's:1950s) model, namely (Direct& Oblique) to highlight the applicability of the different methods and procedures made by the two selected translators (Mashati:1990 & Habeeb:1905) .The present study tries to answer the following questions:(i) To what extent the FDRIs in Henry IV might pose a translational problem for the selected translators to find suitable cultural equivalents for them? (ii) Why do the translators, in many cases, resort to a literal procedure which is almost not worka
... Show MoreThis work implements an Electroencephalogram (EEG) signal classifier. The implemented method uses Orthogonal Polynomials (OP) to convert the EEG signal samples to moments. A Sparse Filter (SF) reduces the number of converted moments to increase the classification accuracy. A Support Vector Machine (SVM) is used to classify the reduced moments between two classes. The proposed method’s performance is tested and compared with two methods by using two datasets. The datasets are divided into 80% for training and 20% for testing, with 5 -fold used for cross-validation. The results show that this method overcomes the accuracy of other methods. The proposed method’s best accuracy is 95.6% and 99.5%, respectively. Finally, from the results, it
... Show More
