Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
Hydromorphometric analysis as a method is considered one of the most reliable and used methods in solving hydrological problems. Where it is possible to know the volume of runoff and the rest of the elements that enter into the water balance. Geographical Information System and Remote Sensing is the technique that used the hydro-morphometric analysis of the Wadi Al-Mohammadi basin. Wadi Al-Mohammadi, located in the Western Desert, is one of the main valleys that flow into the Euphrates River. It is considered an important basin, because of its many characteristics, including its relatively large area and the amount of water drained through, which is used mainly in watering livestock and agriculture, in addition to industrial purposes suc
... Show MoreAfter the year 2003 terrorist attacks knock Baghdad city capital of Iraq using bomb explosion various, shook the nation, and made public resident of Baghdad aware of the need for better ways to protect occupants, assets, and buildings cause the terrorist gangs adopt style burst of blast to injury vulnerability a wider range form, and many structures will suffer damage from air blast when the overpressure concomitant the blast wave, (i.e., the excess over the atmospheric pressure 14.7 pounds per square inch at standard sea level conditions are about one-half pound per square inch or more(
to attainment injury. Then, the distance to which this overpressure level will extend depends primarily on the energy yield (§1.20) of the burst of
This paper is based on the Sentinel-2 satellite data: the thermal, red, and NIR bands. The Babylon city was chosen in this study for different reasons: its location in the middle of Iraq and it represents the largest capitals of the Mesopotamia civilization in the word. The Land Surface Temperature (LST) was determined using a method that incorporates remote sensing, geographic information systems, and statistics. This process has made it possible to monitor the relationship between land usage and the land surface temperature for four seasons in the year 2021. The mapswere processed and analyzed by using ArcGIS software. Five maps of the LST were constructed. Each map represents diffe
The current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method) involved using three different solvents which are absolute ethanol, 50% aqueous ethanol and water for both extraction methods using room temperature and direct heat respectively. Crude extracts of two tea samples that obtained from two methods were fractionated by using two solvents with different polarity (chloroform and
... Show MoreBackground: The marginal seal is essential for sealant success because penetration of bacteria under the sealant might allow caries onset or progression. The aim of the present study was to estimate and compare the microleakage of pit and fissure sealant after various methods of occlusal surface preparation. Materials and methods: Thirty non-carious premolars extracted for orthodontic reasons were equally divided into three groups. In group one, occlusal fissures were opened with round carbide bur, in group two, occlusal surfaces of the teeth were cleaned with a dry pointed bristle brush and samples of group three were cleaned with a slurry of fine flour of pumice in water using rubber cup. Then fissures of all teeth were etched using 35% p
... Show MoreThe normalized difference vegetation index (NDVI) is an effective graphical indicator that can be used to analyze remote sensing measurements using a space platform, in order to investigate the trend of the live green vegetation in the observed target. In this research, the change detection of vegetation in Babylon city was done by tracing the NDVI factor for temporal Landsat satellite images. These images were used and utilized in two different terms: in March 19th in 2015 and March 5th in 2020. The Arc-GIS program ver. 10.7 was adopted to analyze the collected data. The final results indicate a spatial variation in the (NDVI), where it increases from (1666.91 𝑘𝑚2) in 2015 to (1697.01 𝑘𝑚2)) in 2020 between the t
... Show MoreThe skin temperature of the earth’s surface is referred to as the Land Surface Temperature (LST). the availability of long-term and high-quality temperature records is important for various uses that affect people’s lives and livelihoods. Much valid information was provided to this research from remote sensing technology by using Landsat 8 (L8) imagery to estimate LST for Al-Ahdab oil field in Wasit city in Iraq. The aim of this research is to analyze LST variations based on Landsat 8 data for 2022 (January, April, July, and October). ArcMap 10.8 was used to estimate LST results. The results values ranged from (about 10 C in January to about 46 C in July). The results show that LS
This study was conducted to evaluate the efficacy of different techniques for extraction and purification of Tomato yellow leaf curl virus (TYLCV). An isolate of the virus free of possible contamination with other viruses infecting the same host and transmitted by the same vector Bemisia tabaci Genn. was obtained. This was realized by indicator plants and incubation period in the vector. Results obtained revealed that the virus infect Nicotiana glutinosa without visible symptoms, while Nicotiana tabaccum var. White Burley was not susceptible to the virus. The incubation period of the virus in the vector was found to be 21 hrs. These results indicate that the virus is TYLCV. Results showed that Butanol was more effective in clarification the
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show More