Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
Due to the developments taking place in the field of communications, informatics systems and knowledge management in the current century, and the obligations and burdens imposed on the business organization to keep pace with these developments, the traditional methods of administrative decision-making are no longer feasible, as recent trends have emerged in management that focus on the need to rely on quantitative methods such as operations research.. The latter is one of the results of World War II, which appeared for the first time in Britain to manage war operations. The first method used in this field is the linear programming method. The use of operations research has developed greatly in the past years, and the methods of analysis in
... Show MoreBackground: Esthetic correction represents one of the clinical conditions that required the use of laminate veneers in premolars region. Aim of the study: The purpose of this study was to evaluate the fracture strength of the laminate veneers in maxillary first premolars, fabricated from either composite (direct and indirect techniques) or ceramic CAD/CAM blocks. Materials and Methods: Fifty sound human maxillary premolar teeth were used in this in vitro study. Teeth were divided randomly into one control group and four experimental groups of ten teeth each; Group A: Restored with direct composite veneer (Filtek Z250 XT), Group B: Restored with indirect composite veneers (Filtek Z250 XT), Group C: Restored with lithium disilicate ceramic CA
... Show MoreUrban planning include the creation of strategies as well as the management of metro regions, municipalities, and cities. In this study, the importance of applications of remote sensing and GIS in urban planning will be studied. The distribution of educational destitution cases in cities will be considered. A study area (Baghdad city) will be adopted, and the spatial analysis of the distribution will be according to population densities. In this study, the focus was on the importance of the sustainable distribution of urban educational institutions and the spatial appropriateness of this distribution according to the study areas and the available information. Distribution maps were pr
In this paper, two of the local search algorithms are used (genetic algorithm and particle swarm optimization), in scheduling number of products (n jobs) on a single machine to minimize a multi-objective function which is denoted as (total completion time, total tardiness, total earliness and the total late work). A branch and bound (BAB) method is used for comparing the results for (n) jobs starting from (5-18). The results show that the two algorithms have found the optimal and near optimal solutions in an appropriate times.
In this study, an efficient photocatalyst for dissociation of water was prepared and studied. The chromium oxide (Cr2O3) with Titanium dioxide (TiO2) nanofibers (Cr2O3-TNFs) nanocomposite with (chitosan extract) were synthesized using ecologically friendly methods such as ultrasonic and hydrothermal techniques; such TiO2 exhibits nanofibers (TNFs) shape struct
... Show MoreRadiation treatment has long been the conventional approach for treating nasopharyngeal cancer (NPC) tumors due to its anatomic features, biological characteristics, and radiosensitivity. The most common treatment for nasopharyngeal carcinoma is radiotherapy. This study aimed to assess the better quality of radiotherapy treatment techniques using intensity-modulated radiotherapy (IMRT) and volumetric-modulated arc therapy (VMAT). The VMAT and IMRT are comparative techniques. Forty patients with nasopharyngeal carcinoma and forwarded for radiotherapy were treated with both advanced techniques, IMRT and VMAT, using eclipse software from Varian. The x-ray energy was set at 6 MV. The total prescribed dose was 70 Gy. The results show that the
... Show MoreHigh performance work systems and general industrial enterprise performance
Discretionary Punishment, Public Regulation, Interest
-
The problem of the study represented in the gap between what banks possess of Information Technology and Knowledge Management and what they need to help them in decision making and problem solving and achieving High Business Value. It formed a focus and fundamental point for this study in its analysis and interpretation. This was done by a scientific methodology and five chapters.
The study aimed at analyzing the use of partnering Information Technology with Knowledge Management to achieve High Business Value at commercial banks in Jordan. Data were collected from 116 managers, experts, and advisors working for 16 Jordanian banks through a questionnaire de