Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
Do’a and Zikr al-Mā’thur (authentic supplications and remembrance of ALLAH ‘Azza wa Jalla) can be suggested to Muslims to help them deal with challenges or issues in life. Counselling cases affect a person’s feelings. Do’a and Zikr al-Mā’thur are often applied as a counselling intervention. Unfortunately, the authentic Do’a and Zikr al-Mā’thur are dispersed in many resources not visible to users, and the fact that not all online resources offer access to accurate Do’a and Zikr al-Mā’thur to users and the dubious Do’a and Zikr al-Mā’thur frequently credited to the Prophet (pbuh). The goal of this research is to develop an ontology
... Show MoreThe interplay of predation, competition between species and harvesting is one of the most critical aspects of the environment. This paper involves exploring the dynamics of four species' interactions. The system includes two competitive prey and two predators; the first prey is preyed on by the first predator, with the former representing an additional food source for the latter. While the second prey is not exposed to predation but rather is exposed to the harvest. The existence of possible equilibria is found. Conditions of local and global stability for the equilibria are derived. To corroborate our findings, we constructed time series to illustrate the existence and the stability of equilibria numerically by varying the different values
... Show MoreStatistical learning theory serves as the foundational bedrock of Machine learning (ML), which in turn represents the backbone of artificial intelligence, ushering in innovative solutions for real-world challenges. Its origins can be linked to the point where statistics and the field of computing meet, evolving into a distinct scientific discipline. Machine learning can be distinguished by its fundamental branches, encompassing supervised learning, unsupervised learning, semi-supervised learning, and reinforcement learning. Within this tapestry, supervised learning takes center stage, divided in two fundamental forms: classification and regression. Regression is tailored for continuous outcomes, while classification specializes in c
... Show MoreCefixime (CFX) was treated with sodium nitrite and hydrochloric acid for diazotization reaction followed by coupling with ?-Naphthol in alkaline medium to form, a yellow colored azo dye compound which exhibits maximum absorption (?max) at 412 nm where the concentration of (CFX) was determined spectrophotometrically. The optimum reaction conditions and other analytical parameters were evaluated. Beer’s law was obeyed in the concentration range of (1-20) ?g.mL-1 with a molar absorptivity of 34870.5 L.mol-1.cm-1. The limit of detection was found to be 0.1090 ?g.mL-1 and the Sandell's sensitivity value was 0.0130 ?g.cm-2. The proposed method could be successfully applied to
... Show MoreThe study aims to identify the cognitive bias and the level of emotional thinking among university students, besides, identifying the significant differences between male and female students regarding those two variables, and determine if there is a correlation between cognitive bias and emotional thinking. To this end, two scales were adopted to collect needed data: cognitive bias scale designed by (Al-any, 2015), composed of (14) items, and emotional thinking scale designed by (Abdu Allah, 2017), consisted of (27) items. These two scales were administered to (140) students composed the study sample. They were chosen from four different colleges at Al-mustansiriyah University for the academic year (2017-1018). The findings revealed that
... Show MoreThe phenomenon of child labor, any activity performed by a child and represents a contribution to the production, this phenomenon had been rife in Iraqi society, after that the proportion of child labor for the age group (6-14 years) amounting to 3% in 2006, became for the same age group of 8% in 2008*.
It is recognized that each phenomenon reasons, the phenomenon which our atten
... Show MoreHR Al-Hamamy, KE Sharquie, AA Noaimi, WS Abdulwahhab, Journal of Cosmetics, Dermatological Sciences and Applications, 2015 - Cited by 9
In this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including: network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de
... Show MoreMost of the propositions and researches that dealt with fashions in the Middle East, specifically this region from the world, from a historical perspective have not been sufficient, and were characterized by many aspects of immature thinking, in addition, they have been varied in quality. This can be attributed to many factors including: the focus in the field of researches and Middle East studies is on languages, arts, history, and political thinking of the region. Other factors are the information asymmetry, the differences in sources and references, in addition to differences in the scientific value of these sources added to the difficulty of gathering them at the same time especially that these sources are scattered in many places wh
... Show More