Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
Abstract
The aim of the present research is to identify the test wisdom and the preoccupation with learning and psychological tension among postgraduate students at the University of Samarra according to the variables of the department, gender, age, and employee or non-employee, and revealing the relationship between the test wisdom and the preoccupation with learning and psychological tension. The research sample consisted of (75) students randomly selected from postgraduate students at the college of Education. The researcher applies test –wisdom of (Mellman & Ebel) and measurement of preoccupation with learning prepared by (Al-zaabi 2013) also, the researcher used the scale of t
... Show MoreInnovative various Schiff bases and their Co(II), Ni(II) and Cu(II) and Hg(II) compounds made by the condensation of 4-amino antipyrine with derived aminobenzoic acid (2-aminobenzoic acid, 3-aminobenzoic acid, and 4-aminobenzoic acid ) have been prepared by conventional approaches. These complexes were described by magnetic sensibility analysis, FT-IR spectra, and molar-conductance and elemental analysis. Analytical values appeared which the mixed-ligand complexes presented ratio about 2:1 (ligand: metal) with the chelation 4 or 6. The prepared compounds offered a good effect on the organisms; bacteria Staphylococcus-aurous, Escherichia-coli and fungi C. albicans, A. niger. Also, the biological products signalize which the mixed compl
... Show MoreAbstract
This study aimed to survey fungi associated with the product Indomie and Chips being the trades Iargely by a very important segment of society who are the children, beside consumed by adults, but less so, as the survey results to accompany some fungui samples sterile showed proportions presence included various fungi like. Aspergillus flavus, Aspergillus niger, Penicillium Spp., Fusarium graminearum, F.moniliforme, Alternaria alternate and Rhizopus Spp., and other fungi sterile are not diagnosed. The results showed large dominion fungi A. niger by presence sterile samples of both producers, followed by infection in Fusarium Spp., Penicillium Spp., and A. alternata by infection percentage 55, 20 and 17% respectively for the pr
Abstract:
The problem of poverty is one of the most important development challenges facing developing countries including Sudan for several decades. Although many efforts have been made to reduce poverty, however, its rates are increasing, and public policies adopted by the government in this regard remain elusive in achievinging its main objectives or making any significant progress. The purpose of the present study is to analyse poverty in Sudan by identifying its measurement, causes and the factors that have contributed to the increasing poverty rates over the past two decades. Also this study aims at investigating the interim poverty reduction strategy in Sudan as well as evaluates that strategy throug
... Show MoreChapter-1
Problem of the research:
The studies and researches have noticed the aggravation of violence practice in all educational means using different and innovated styles against children in the school and house in order to upbringing by the parents or the school .
It is a training method for the person to participate in the society and prepare him to be an effective member.
The current research confines the children in age (6-12) years old representing the primary stage who face different kind of violence during the familiar or school education.
The current research aims to:
1 – The kinds of violence which happens to the children in the primary
... Show MoreSteps were taken to obtain the Kojic acid crystals from local fungal isolation A. flavus WJF81 by separating the fermentation products from the fungus mycelium from the production plant at the centrifuge at a speed of 5000 cycles for 10 minutes. The extraction was followed by ethyl acetate then supernatant concentrate by using rotary evaporator, and dried with heat oven 37ºC. Long, yellowish, pristine acid crystals were obtained that examined the optical microscope with a magnification force of 10x and 40x. The melting point of kojic acid was determined between 152.9-153.5 °C Results of the diagnosis of Kojic acid by applying High pressure liquid chromatography HPLC technique showed that the acid was at one peak, which was close to the
... Show MoreThe advertisement is important in maximizing the resources of journalistic institutions. It helps them to perform their duties and also establishes their independence. However, this type of communication has often overlapped with other types of communication, including media and publicity.
Those in charge of the press bear responsibility in this regard, as some of them harness the advertisement for personal purposes; or detrimental to media content. Many communication authorities have drawn attention to the danger of confusing the concepts and levels of the three activities and have moved towards establishing rules to reduce overlap between them.
The aim of this research is to try to disengage the concept of advertising,
... Show MoreThe contractual imbalance is perceived today by the majority of the doctrine as being one of the pitfalls to the execution of the contracts. As a result, most legislations grant judges the power to intervene to restore it. Granting the judge the power to complete the contract raises the question of the extent to which the judge can obtain such power. Is it an absolute authority that is not limited? If so, is it a broad discretion in which the judge operates in his conscience, or is it a power of limited scope by specific legal texts and conventions? This is what we will try to answer in this research.
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More