Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
مجلة العلوم الاقتصادية والإدارية المجلد 18 العدد 69 الصفحات 318- 332 |
The results of the historical review of social and political realities in general show that the practical and procedural applications of social engineering as a particular activity primarily of the social and political characteristics of man and society emerged in modern Western societies before appearing in other societies, These results also show that the emergence of these practical reasons and their applications in the West has also seen the emergence of modern theoretical foundations there, which seems to be the usual and usual context everywhere and in most or not all areas of life. Since the social and political dimensions are intertwined in human life and are in full, comprehensive and lasting harmony, interest in this geometry h
... Show MoreIn this present work, [4,4`-(biphenyl-4,4`-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1-ylidene)bis(2-methoxyphenl)(A1),4,4`-(biphenyl-4,4`-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1-ylidene)diphenol(A2),1,1`-(biphenyl-4,4`-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1-ylidene) dinaphthalen-2-ol (A3)]C.S was prepared in 3.5% NaCl. Corrosion prevention at (293-323) K has been studied by using electrochemical measurements. It shows that the utilized inhibitors are of mixed type based on the polarization curves. The results indicated that the inhibition efficiency changes were used with a change according to the functional groups on the benzene ring and through the electrochemical technique. Temperature increases with corrosion current
... Show MoreIt is proposed and studied a prey-predator system with a Holling type II functional response that merges predation fear with a predator-dependent prey's refuge. Understanding the impact of fear and refuge on the system's dynamic behavior is one of the objectives. All conceivable steady-states are investigated for their stability. The persistence condition of the system has been established. Local bifurcation analysis is performed in the Sotomayor sense. Extensive numerical simulation with varied parameters was used to explore the system's global dynamics. A limit cycle and a point attractor are the two types of attractors in the system. It's also interesting to note that the system exhibits bi-stability between these 2 types of attractors.
... Show MoreSchiff bases, named after Hugo Schiff, are aldehyde- or ketone-like compounds in which the carbonyl group is replaced by imine or azomethine group. They are widely used for industrial purposes and also have a broad range of applications as antioxidants. An overview of antioxidant applications of Schiff bases and their complexes is discussed in this review. A brief history of the synthesis and reactivity of Schiff bases and their complexes is presented. Factors of antioxidants are illustrated and discussed. Copyright © 2016 John Wiley & Sons, Ltd.
تسعى المحاسبة الى مسايرة القفزات الهائلة والمتسارعة في تطور العلوم الصرفة والتطبيقية والتقدم التكنولوجي، والتي ادت على ظهور مفاهيم جديدة الغت مسلمات وبديهيات كانت سائدة لمدة طويلة، فعلى سبيل المثال: كان مخزون المواد الاولية والبضاعة التامة في المؤسسات الصناعية او التجارية يشكل العمود الفقري لها بتكاليفه ومشاكله، حتى اذا ما جاء نظام (JIT) الغى بتطبيقاته هذه المفاهيم واعتمد م
... Show MoreThe purpose of this study was to examine the role of cortisol, and it is related to BMI in the chronic diseases which may increase early cardiovascular disease (CVD) in old Iraqi. The subjects were 116 adults, aged 51-71 years. Body Mass Index (BMI), Waist Circumferences (WC) and Waist Hip Ratio (WHR) were used as a measure of adiposity. Investigation showed highly significant difference between patients in BMI ranges, most of male were in an obese weight range (48.5%), as well in women. There were no significant correlations between serum cortisol concentration and age both gender groups. While there were highly significant correlations between cortisol level and BMI, waist, and WHR (except in female subjects), also there were highly signi
... Show More