Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
Twenty isolates of Serratia marcescens were isolated from inflammation of the urinary tract (UTI)., These isolates were found to produce hemolysin as indicated by blood agar plates in which the hemolysis of red blood cell indicate a positive result. Isolates were selected according to their hemolysis activity by measuring absorbance of hemoglobin at 405 nm that released from red blood cell. Hemolysin was completely purified using 50-75% saturation of ammonium sulphate followed by ion exchange chromatography with DEAE-cellulose then gel filtration chromatography by sepharose 4B. Accordingly molecular weight for the purified toxin was estimated as 45 KD.
Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreThere is limited data and evidence about the effects of COVID-19 on Maternal health, especially when new information is emerging daily, through pregnancy, child birth and post natal period, women are vulnerable to have the infection, this article, aimed to show the suitable measures that should be applied for women at reproductive age who are suspected /confirmed with COVID -19 infection,
During pregnancy it is advisable to continue the antenatal care schedule, although reducing face to face visit is recommended (unless the pregnant condition required that ),and prioritize ANC at health facilities for high-risk pregnancy and during second half of pregnancy with adequate infection prevention control measures.
Regardi
... Show MoreThere is a continuous and massive need for newer cephalosporins that should have resistance against β-lactamases and can be used orally. An approach of using cephalexin, as a well-studied and potent antibacterial compound is considered to prepare new designed derivatives. These derivatives include the incorporation of amino acid moiety linked through an amide bond with the α-amino group of cephalexin. Certain aliphatic amino acids were used, such as glycine, alanine, valine and proline. The chemical structures of these derivatives were confirmed by IR spectroscopy and elemental analyses. All the synthesized compounds were subjected for preliminary evaluation of antimicrobial activity using well diffusion method, against certa
... Show MoreThis study seeks to investigate Sinan Antoon’s I’jaam (2004) through applying different theoretical frameworks including those of Althusser (1971) and Foucault (1978). Antoon, considered as one of the most internationally recognized Iraqi writers, wrote this dystopian, war novel in Arabic and translated it to English. Antoon’s emphasis placed on literature acting as an oppositional political voice has, in turn, created its own form of censorship inside the fictional world and outside the actual state censorship during Saadm Hossein reign. Thus, particular political messages within literary texts, like I’jaam, have been received with critical attention. The writing culture in Iraq has established an atmosphere in which literary criti
... Show MoreTwo types of adsorbents were used to treat oily wastewater, activated carbon and zeolite. The removal efficiencies of these materials were compared to each other. The results showed that activated carbon performed some better properties in removal of oil. The experimental methods which were employed in this investigation included batch and column studies. The former was used to evaluate the rate and equilibrium of carbon and zeolie adsorption, while the latter was used to determine treatment efficiencies and performance characteristics. Expanded bed adsorber was constructed in the column studies. In this study, the adsorption behavior of vegetable oil (corn oil) onto activated carbon and zeolite was examined as a function of the concentr
... Show MoreNew derivatives of the anti-inflammatory, leprostatic drug dapsone 4 are synthesized, characterized and biologically screened by the treating the drug dapsone with chloroacetyl chloride in the presence of base. Both amino groups are acylated to give compound 6. The symmetrical acylated product then treated with Phenol, N-Acetyl-p-aminophenol, p-Chlorophenol, m-Chlorophenol, o-Hydroxybezoic acid and m-Hydroxybezoic acid to give compounds 8(a-f). The antimicrobial activity was tested for the synthesized compounds; activates were good compared to the parent drug. All the new compounds have scanned for their biological activities toward gram ‒ve and gram +ve (M. tuberculosis, S. pneumoniae, E. coli and P. mirabilis) bacteria, the synthesized
... Show More