Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
Language is the realistic and sensitive basis for any communication between two or more parties. It is an important workshop that prepares meanings and coding them according to a linguistic structure governed by agreed rules that speak to and coexist with everyone.
Whereas the forms of communication are: personal, mediator and mass, none of them can move away from language in their dealings and communication patterns. Since each has its own characteristics and skills, it must be launched in its fields through verbal and non-verbal symbols and wears the elements of influential language as intended.
It makes the recipient face two things: whether he fails to understand those symbols hence its purpose fail, or he meditates s
... Show MoreIn this research Artificial Neural Network (ANN) technique was applied to study the filtration process in water treatment. Eight models have been developed and tested using data from a pilot filtration plant, working under different process design criteria; influent turbidity, bed depth, grain size, filtration rate and running time (length of the filtration run), recording effluent turbidity and head losses. The ANN models were constructed for the prediction of different performance criteria in the filtration process: effluent turbidity, head losses and running time. The results indicate that it is quite possible to use artificial neural networks in predicting effluent turbidity, head losses and running time in the filtration process, wi
... Show MoreIn this paper, the human robotic leg which can be represented mathematically by single input-single output (SISO) nonlinear differential model with one degree of freedom, is analyzed and then a simple hybrid neural fuzzy controller is designed to improve the performance of this human robotic leg model. This controller consists from SISO fuzzy proportional derivative (FPD) controller with nine rules summing with single node neural integral derivative (NID) controller with nonlinear function. The Matlab simulation results for nonlinear robotic leg model with the suggested controller showed that the efficiency of this controller when compared with the results of the leg model that is controlled by PI+2D, PD+NID, and F
... Show MoreThis paper presents an investigation of peristaltic flow of Bingham plastic fluid in an inclined tapered asymmetric channel with variable viscosity. Taken into consideration Hall current, velocity, thermal slip conditions, Energy equation is modeled by taking Joule heating effect into consideration and by holding assumption of long wavelength and low Reynolds number approximation these equations simplified into couple of non-linear ordinary differential equations that solved using perturbation technique. Graphical analysis has been involved for various flow parameters emerging in the problem. We observed two opposite behaviors for Hall parameter and Hartman number on velocity axial and temperature curves.
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreImage Fusion is being used to gather important data from such an input image array and to place it in a single output picture to make it much more meaningful & usable than either of the input images. Image fusion boosts the quality and application of data. The accuracy of the image that has fused depending on the application. It is widely used in smart robotics, audio camera fusion, photonics, system control and output, construction and inspection of electronic circuits, complex computer, software diagnostics, also smart line assembling robots. In this paper provides a literature review of different image fusion techniques in the spatial domain and frequency domain, such as averaging, min-max, block substitution, Intensity-Hue-Saturation(IH
... Show MoreIn this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common means of securing computer systems. Most organizations rely on password authentication systems, and therefore, it is very important for them to enforce their users to have strong passwords. They usually ignore the importance of usability of the password for the users. The more complex they are the more they frustrate users and they end up with some coping strategies such as adding “123” at the end of their passwords or repeating a word to make their passwords longer, which reduces the security of the password, and more importantly there is no scientific basis
... Show MoreThe research aimed mainly to discover the effectiveness of the (PEOE) model in teaching science to develop the skills of generating and evaluating information and the emotional side of the scientific sense of the intermediate first grade students. An experimental approach with a quasi-experimental design called pre-test and post-test control design was used. The research sample consisted of (60) students, who were selected in a random cluster method, (30) students in the experimental group studied the unit "The Nature of Material" using the (PEOE) model, and (30) students in the control group studied according to the prevailing method of teaching. The research materials and tools were represented in: a teacher's guide for teaching the un
... Show Morethe mental image is so important in human life as one of the major standers for his trends and behavior, and as the human nature requires to interest in things based on how much it’s close to and how much it effects on his interest, So the neighborhood countries was one of the topics that occupied the attention of the Iraqi individual and pushed him to form perceptions of them based on the cultural heritage and the historical relations of Iraq with these countries as well as the actions of neighboring countries on Iraq and the resulting effects on the course of events. the mental image is so important in human life as one of the major standers for his trends and behavior, and as the human nature requires to interest in things bas
... Show MoreInternational law has proven that it is an evolving and flexible law over the years, and despite that, this development takes a very long time, as the concept of peremptory norms took 83 years to crystallize and have concrete and impactful applications, and within this development another modern concept emerged, which is the obligations Erga Omnes in the Barcelona Traction case 1970. We have concluded that these two concepts fall under a broader concept, which is peremptory norms, and this concept represents the common supreme interests of the international community, and consists of rules that transcend all other rules in international law, and it is not permissible to derogate or deviate from them. On the other hand, it bears the oblig
... Show More