Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
Aceclofenac (AC) is an orally active phenyl acetic acid derivative, non-steroidal anti-inflammatory drug with exceptional anti-inflammatory, analgesic and antipyretic properties. It has low aqueous solubility, leading to slow dissolution, low permeability and inadequate bioavailability. The aim of the current study was to prepare and characterize AC-NS-based gel to enhance the dissolution rate and then percutaneous permeability. NS.s were prepared using solvent/antisovent precipitation method at different drug to polymer ratios (1:1, 1:2, and 1:3) using different polymers such as poly vinyl pyrrolidone (PVP-K25), hydroxy propyl methyl cellulose (HPMC-E5) and poloxamer® (388) as stabilizer
... Show MoreContamination of surface and groundwater with excessive concentrations of fluoride is of significant health hazard. Adsorption of fluoride onto waste materials of no economic value could be a potential approach for the treatment of fluoride-bearing water. This experimental and modeling study was devoted to investigate for the first the fluoride removal using unmodified waste granular brick (WGB) in a fixed bed running in continuous mode. Characterization of WGB was carried out by FT-IR, SEM, and EDX analysis. The batch mode experiments showed that they were affected by several parameters including contact time, initial pH, and sorbent dosage. The best values of these parameters that provided maximum removal percent (82%) with the in
... Show MoreThe dual nature of asphalt binder necessitates improvements to mitigate rutting and fatigue since it performs as an elastic material under the regime of rapid loading or cold temperatures and as a viscous fluid at elevated temperatures. The present investigation assesses the effectiveness of Nano Alumina (NA), Nano Silica (NS), and Nano Titanium Dioxide (NT) at weight percentages of 0, 2, 4, 6, and 8% in asphalt cement to enhance both asphalt binder and mixture performance. Binder evaluations include tests for consistency, thermal susceptibility, aging, and workability, while mixture assessments focus on Marshall properties, moisture susceptibility, resilient modulus, permanent deformation, and fatigue characteristics. NS notably im
... Show MoreThe estimation of the initial oil in place is a crucial topic in the period of exploration, appraisal, and development of the reservoir. In the current work, two conventional methods were used to determine the Initial Oil in Place. These two methods are a volumetric method and a reservoir simulation method. Moreover, each method requires a type of data whereet al the volumetric method depends on geological, core, well log and petrophysical properties data while the reservoir simulation method also needs capillary pressure versus water saturation, fluid production and static pressure data for all active wells at the Mishrif reservoir. The petrophysical properties for the studied reservoir is calculated using neural network technique
... Show MoreIt is important to note that Posaconazole (POCZ) is a newly developed extended-spectrum triazole that belongs to BCS class II and has a solubility of less than 1µg/ml. In patients with a weakened immune system, POCZ has been shown to be effective as an antifungal treatment for invasive infections caused by candida and aspergillus species. The nano-micelles technique can be used to increase POCZ solubility. In order to increase their apparent solubility in water, nano-micelles are made by combining macromolecules that self-assemble into ordered structures capable of entrapping hydrophobic drug molecules in the interior domain. Dispersed colloidal systems, of which nano-micelles are a subset, are a large and diverse group. Composed of a p
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreThe growth of developments in machine learning, the image processing methods along with availability of the medical imaging data are taking a big increase in the utilization of machine learning strategies in the medical area. The utilization of neural networks, mainly, in recent days, the convolutional neural networks (CNN), have powerful descriptors for computer added diagnosis systems. Even so, there are several issues when work with medical images in which many of medical images possess a low-quality noise-to-signal (NSR) ratio compared to scenes obtained with a digital camera, that generally qualified a confusingly low spatial resolution and tends to make the contrast between different tissues of body are very low and it difficult to co
... Show MoreAbstract
Business organizations are using the technological innovations like cloud computing (CC) as a developmental platform in order to improve the performance of their information systems. In that context, our paper discusses know-how in employing the public and private CC to serve as platforms to develop the evaluation system of annual employees' performance (ESAEP) at Iraqi universities. Therefore, we ask the paper question which is “Is it possible to adopt the innovative solutions of ICTs (Like: public and private CC) for finding the developmental vision about management information systems at business organizations?”. In addition, the paper aim
... Show More