Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
A precise evaluation of caries excavation endpoint is essential in clinical and laboratory investigations. Caries invasion differentiates dentin into structurally altered layers. This study assessed these changes using Raman spectroscopy and Vickers microhardness. Ten permanent molars with occlusal and proximal carious lesions were assessed and compared at 130 points utilizing four Raman spectroscopic peaks: phosphate v1 at 960 cm−1, amide I (1650 cm−1), amide III (1235 cm−1) and the C-H bond of the pyrrolidine ring (1450 cm−1). The phosphate-to-amide I peak ratio and collagen integrity peak ratio (amide III: C-H bond) of carious zones were calculated and compared in both lesions. The former ratio was correlated to 130 Vicke
... Show MoreApplications of remote sensing are important in improving potato production through the broader adoption of precision agriculture. This technology could be useful in decreasing the potential contamination of soil and water due to the over-fertilization of agriculture crops. The objective of this study was to assess the utility of active sensors (Crop Circle™, Holland Scientific, Inc., Lincoln, NE, USA and GreenSeeker™, Trimble Navigation Limited, Sunnyvale, CA, USA) and passive sensors (multispectral imaging with Unmanned Arial Vehicles (UAVs)) to predict total potato yield and phosphorus (P) uptake. The experimental design was a randomized complete block with four replications and six P treatments, ranging from 0 to 280 kg P ha−1, as
... Show More
Buildings such as malls, offices, airports and hospitals nowadays have become very complicated which increases the need for a solution that helps people to find their locations in these buildings. GPS or cell signals are commonly used for positioning in an outdoor environment and are not accurate in indoor environment. Smartphones are becoming a common presence in our daily life, also the existing infrastructure, the Wi-Fi access points, which is commonly available in most buildings, has motivated this work to build hybrid mechanism that combines the APs fingerprint together with smartphone barometer sensor readings, to accurately determine the user position inside building floor relative to well-known lan
... Show MoreShadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit
... Show MoreThis study concerns a new type of heat exchangers, which is that of shell-and-double concentric tube heat exchangers. The case studies include both design calculations and performance calculations.
The new heat exchanger design was conducted according to Kern method. The volumetric flow rates were 3.6 m3/h and 7.63 m3/h for the hot oil and water respectively. The experimental parameters studied were: temperature, flow rate of hot oil, flow rate of cold water and pressure drop.
A comparison was made for the theoretical and experimental results and it was found that the percentage error for the hot oil outlet temperature was (- 1.6%). The percentage
... Show MoreThe pandemic of coronavirus disease 2019 (COVID-19), first reported in China, in December 2019 and since then the digestive tract involvement of COVID-19 has been progressively described. In this review, I summed recent studies, which have addressed the pathophysiology of COVID-19-induced gastrointestinal symptoms, their prevalence, and bowel pathological and radiological findings of infected patients. The effects of gut microbiota on SARS-CoV-2 and the challenges of nutritional therapy of the infected patients are depicted. Moreover, I provide a concise summary of the recommendations on the management of inflammatory bowel disease, colorectal cancer, and performing endoscopy in the COVID era. Finally, the COVID pancreatic re
... Show MoreIn Algeria, education is compulsory for males and females. This foundational decision was taken right after the independence of the country in 1962. Soon after, in 1963, the central government decided the Arabisation of the whole educational levels starting from primary school till university. At the same period, illiteracy-eradication programmes were launched by the Ministry of Education to get rid of this post-colonial scourge. In the administrative department (or Wilaya) of Adrar, former Tuat, young males and females attend Quranic schools (Zawaya) well before any formal education, that is as early as 4-5 years of age. The adult people who are not enrolled in formal classes could sit for non-formal ones. However, actual measurements a
... Show MoreIn the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),
... Show MoreVehicular Ad Hoc Networks (VANETs) are integral to Intelligent Transportation Systems (ITS), enabling real-time communication between vehicles and infrastructure to enhance traffic flow, road safety, and passenger experience. However, the open and dynamic nature of VANETs presents significant privacy and security challenges, including data eavesdropping, message manipulation, and unauthorized access. This study addresses these concerns by leveraging advancements in Fog Computing (FC), which offers lowlatency, distributed data processing near-end devices to enhance the resilience and security of VANET communications. The paper comprehensively analyzes the security frameworks for fog-enabled VANETs, introducing a novel taxonomy that c
... Show More