Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
The process of capital investment appraisal takes hold the attention of managers and accountants of the industrial companies. This process involves the use of multiple and diverse financial evaluation methods to measure the economic attractiveness of capital investment peojects. This multiplicity and diversity of financial evaluation metods have been the motive of this research to: investigate some organizational variables such as the desired objectives, identify managerial procedures which regulate the capital investment process, specify evaluation methods and examine the relationships between these variables and evaluation methods actually used by a sample of public industrial companies in Jordan.
The data wa
... Show MoreThe goal of this research to identify a set of criteria that can be measured on the basis of which the effectiveness of the application of the Balanced Scorecard in the Jordanian Public Institutions in order to identify the basic requirements to ensure the application of balanced performance measures. The study population consisted of the staff of the Public Institution for Social Security - Irbid of directors of departments and heads of departments and administrative staff, was the use of a random sample of (50) an employee and the employee. The questionnaire was used as a tool to collect data, and as a result of subjecting these standards for the field test and the use of statistical analysis tools to the results of the study c
... Show MoreQuantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.
Modeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show MoreIn this study, phytoplankton density, chlorophyll-a, and selected physico- chemical parameters were investigated in Erbil wastewater channel. The surveys were carried out monthly from May 2003 to April 2004. Samplings were established on three sites from headwaters to the mouth. The results showed that pH was in alkaline side of neutrality, with significant differences (P<0.05) between sites 1 and 3. TSS concentration decreased from site 1 toward site 2 (mean value, 80.15 to 25.79 mg.l-1). A clear gradual increase in mineral content (TDS) observed from site one of the channel towards the mouthpart. Soluble reactive phosphate has a concentration maximum mean value reached 48.4 µg.l-1 which is recorded in site 2. A high positive relat
... Show MoreA new, effective, simple and inexpensive method was developed for determination the amounts of Ciprofloxacin HCl in solutions and in tablets by spectrophotometry and turbidity using sodium tungstate as reagent. Also, in this paper comparison between two techniques was conducted. The reaction between the Ciprofloxacin HCl and reagent in acidic media formed a yellowish white complex. Chemical and physical conditions have been investigated. The Linear range for spectroscopic and turbidimetric techniques were (0.05-1.25) and (0.05-3.0) mmol.L-1 with correlation coefficients (0.9956) and (0.9941) respectively. The limits of detection were 7×10-5 and 5×10-5 mol.L-1. The proposed method is good alternative for determination of Ciprofloxacin H
... Show MoreThis paper presents a hierarchical model of localized company effective when is used in a university campus or site. To highlight the standard criteria for each layer of the model and to prove the positive aspects of this model is the best in use and make the Dell Network as case of study. Through the case of study it has been shown that the expansion of the on-site network does not affect services or bandwidth.
Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show MoreRecently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul
... Show More