Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreMany consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s
... Show MoreThe aim of this paper is to introduce the concepts of asymptotically p-contractive and asymptotically severe accretive mappings. Also, we give an iterative methods (two step-three step) for finite family of asymptotically p-contractive and asymptotically severe accretive mappings to solve types of equations.
Despite the great economic and commercial importance given to real estate by virtue of its view of the landscape or public roads, US courts have differed in their position on compensation for damages resulting from blocking that view or vision by public projects. Some courts compensated for such damages, other courts approved such compensation. Hence, this research came to shed light on the extent of the possibility of compensation for blocking the view or vision as a result of public projects, and the research has supported us with many judicial decisions.
In this paper, author’s study sub diffusion bio heat transfer model and developed explicit finite difference scheme for time fractional sub diffusion bio heat transfer equation by using caputo fabrizio fractional derivative. Also discussed conditional stability and convergence of developed scheme. Furthermore numerical solution of time fractional sub diffusion bio heat transfer equation is obtained and it is represented graphically by Python.
In this research, a mathematical model of tumor treatment by radiotherapy is studied and a new modification for the model is proposed as well as introducing the check for the suggested modification. Also the stability of the modified model is analyzed in the last section.
Background: Type 2 diabetes mellitus (T2DM) characterized by insulin resistance (IR) and progressive decline in functional beta (β) cell mass partially due to increased β cell apoptosis rate. Pancreatic stone protein /regenerating protein (PSP/reg) is produced mainly by the pancreas and elevated drastically during pancreatic disorder. Beta cells are experiencing apoptosis that stimulate the expression of PSP/reg gene in surviving neighboring cells, and that PSP/reg protein is subsequently secreted from these cells which could play a role in their regeneration.
Objectives: To analyze serum levels of PSP/reg protein in T2DM patients and evaluate its correlation with the microvasc
... Show More