Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
Five different bacterial isolates [ Vibrio cholera (Ogawa) , Vibrio cholera (Inaba) , Salmonella typhi , Salmonella paratyphi and ? Salmonella typhimurium ] were obtained from the Central Health Laboratory . Both sensitivity tests (MIC , MBC and wells method ) against these bacteria were performed by using the aqueous of leaves extract of Marjoram plant. The results cleared that the values of MIC for Vibrio cholera serotypes Ogawa and Inaba were 100 mg/ml , while the value of MBC was 200 mg/ml. The value of the Inhibition zone at 100 mg /ml concentration for both Ogawa and Inaba were 13 mm and 9 mm respectively. Our results showed that the three types of Salmonella didn’t show any inhibition zone at 200 mg/ml .
WKAJ Khalifa E. Sharqui1,*, Adil A. Noaimi2, Ali R. Auda3, American Journal of Dermatology and Venereology, 2014 - Cited by 1
In this paper, the path of the extracted and focused ions by the electrostatic lense having three electrodes of the same size and shape have been studied. However, the first and third electrodes had a different potential from the second electrode and the distance between any three electrodes was (d).The beams of the charged particles were controlled by using electrostatic fields which are used for accelerating and focusing. This paper focuses also on the effect of electrodes potentials on ion beam focusing. It is found that the best focusing was achieved when the values of the potential of the first and third electrode are equal to half of the value of the second electrode. Concerning transmiting and acumulating the ions beams, the study sh
... Show MoreBackground: Hodgkin's lymphoma (HL), formerly called Hodgkin's diseases is an uncommon form of lymphoma. The incidence of Hodgkin's lymphoma shows marked heterogeneity with respect to age, gender, race, geographic area, social class and histological subtype. This study was carried out in an attempt to evaluate the incidence of Hodgkin's lymphoma of head and neck in Baghdad city. Materials and Methods: The diagnosed cases of Hodgkin's lymphoma of head and neck region in Baghdad city between (1990-1999) were collected and analyzed according to age, gender, site and the histopathological subtypes of the tumor. Results: Out of (702) cases of Hodgkin's lymphoma of ten years between (1990-1999),(362 ) of them were occurred in the head and neck
... Show MoreIn this work, As60Cu40-xSex thin films were synthesized, and the pulsed laser deposition method was used to study the effected partial replacement of copper with selenium. The electrical characteristics and optical characteristics, as indicated by the absorbance and transmittance as a function of wavelength were calculated. Additionally, the energy gap was computed. The electrical conductivity of the DC in the various conduction zones was calculated by measuring the current and voltage as a function of temperature. Additionally, the mathematical equations are used to compute the energy constants, electron hopping distance, tail width, pre-exponential factor, and density of the energy states in variation zones (densities of the energ
... Show MoreAl-Ruhbah region is located in the southwest of Najaf Governorate. A numerical model was created to simulate groundwater flow and analyze the water quality of the groundwater, by developing a conceptual model within the groundwater modeling system software. Nineteen wells were used, 15 for pumping and four for observation. A three-dimensional model was built based on the cross-sections indicating the geologic layers of the study area, which were composed of five layers. When a distance of 1,000 m between the wells was adopted, 135 wells can be operated simultaneously. These wells were hypothetically operated at 6, 12, and 18 h intervals, with a discharge of 200, 430, and 650 m
Melanoidins can be diagnosed using the Fourier transform infrared (FTIR) technique. UV/Vis is an effective tool for both qualitative and quantitative analysis of chemical components in melanoidin polymers. The structural and vibrational features of melanoidin synthesized from D-glucose and D-fructose are identical, according to FTIR spectra, with the only difference being the intensity of bands. Using FTIR spectra, the skeleton of melanoidin is divided into seven major regions. The existence of the C=C, C=N, and C=O groups in all melanoidins formed from fructose and glucose with ammonia is confirmed by the areas ranging from 1600 to 1690 cm-1, and the band is largely evident as a broad shoulder. Both melan
... Show MoreThe interplay of predation, competition between species and harvesting is one of the most critical aspects of the environment. This paper involves exploring the dynamics of four species' interactions. The system includes two competitive prey and two predators; the first prey is preyed on by the first predator, with the former representing an additional food source for the latter. While the second prey is not exposed to predation but rather is exposed to the harvest. The existence of possible equilibria is found. Conditions of local and global stability for the equilibria are derived. To corroborate our findings, we constructed time series to illustrate the existence and the stability of equilibria numerically by varying the different values
... Show More