Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
Background: Acute lung injury (ALI) is among the most serious conditions characterized by an exacerbation of inflammatory response that can result from a persistent lung infection. Carvone is chiral monoterpenoid ketone present in the essential oils of dill, caraway, and spearmint. It shows antioxidant, anti-inflammatory, and antimicrobial effects among others. In this study, the lung anti-inflammatory and protective effects and potential mechanism of action of carvone were investigated in ALI induced by Lipopolysaccharide (LPS).
One of the most important problems in tablet process is to control the flow of the catalyst through the hopper; Controlling the flow can be done either by changing the size of particles or added the different lubricant (stearic acid, starch, graphite) or blending of different lubricants. The study showed that we can control (increase or decrease) on the flow of the catalyst through the hopper by blending different lubricants for the constant percentage. The flow increasing when particles size (0.6 mm) and then decrease with or without lubricants, no effect on flow when particles size lower than (0.2 mm) with use that lubricants, and good flow on (0.4 mm) when use stearic acid and starch.
Abstract
Despite the fact of the importance and effectiveness of supporting the pricing policy for agriculture sector in Iraq, but this policy has stopped in supporting those agriculture production needs, and it was confined to support the final product only, and supporting the strategic corps exclusively after the U.S. Invasion in 2003, but after 2008 the state has returned to support some of this policy activities through providing financial loans through the agricultural initiative campaign, with trillions of iraqi dinars without any use, also providing support to some of the agricultural production needs such as fertilizers , tractors and agricultural combines, in addition supporting the pricing policy for the
... Show MoreThe Foreign Account Tax Compliance Act (FATCA) basically targets US citizens’ accounts hold at foreign banks and financial institutions blush, seems and non-financial sector by the Act:( retirement plan companies, investment funds, hedge funds and family investment companies.)
The non Compliance of Foreign of financial institutions act will lead to financial looses and harm regarding reputation, especially for the countries that rely on foreign relations in their financial and banking activities, in addition to deducting 30 % of their total incomes and sales coming from the USA. These institutions can avoid it by entering into agreement with the Internal Revenue Service's to be foreign financial institutions complied with the a
... Show MoreThis investigation aims to explore the potential of waterworks sludge (WS), low-cost byproduct of water treatment processes, as a sorbent for removing Congo Red (CR) dyes. This will be achieved by precipitating nano-sized (MgAl-LDH)-layered double hydroxide onto the surface of the sludge. The efficiency of utilizing MgAl-LDH to modify waterworks sludge (MWS) for use in permeable reactive barrier technology was confirmed through analysis with Fourier transform infrared and X-ray diffraction. The isotherm model was employed to elucidate the adsorption mechanisms involved in the process. Furthermore, the COMSOL model was utilized to establish a continuous testing model for the analysis of contaminant transport under diverse conditions. A st
... Show MoreThe one-dimensional, cylindrical coordinate, non-linear partial differential equation of transient heat conduction through a hollow cylindrical thermal insulation material of a thermal conductivity temperature dependent property proposed by an available empirical
function is solved analytically using Kirchhoff’s transformation. It is assumed that this insulating material is initially at a uniform temperature. Then, it is suddenly subjected at its inner radius with a step change in temperature. Four thermal insulation materials were selected. An identical analytical solution was achieved when comparing the results of temperature distribution with available analytical solution for the same four case studies that assume a constant the
The meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when
... Show More
The current research aims to test the relationship of the impact of sustainable leadership as an independent variable in organizational happiness as a dependent variable, in the departments and divisions of the Tourism Authority, to come up with a set of recommendations that contribute to raising the level of organizational happiness in the authority. And based on the importance of the research topic in the General Authority, and the prominent role that this body plays in society, the researcher adopted the descriptive and analytical approach in carrying out this research, by collecting data from the departments and divisions staff of (160) respondents in an exclusively comprehensive
... Show MoreAudio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to
... Show MoreThis paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance