Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.
A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreSoftware Defined Network (SDN) is a new technology that separate the control plane from the data plane. SDN provides a choice in automation and programmability faster than traditional network. It supports the Quality of Service (QoS) for video surveillance application. One of most significant issues in video surveillance is how to find the best path for routing the packets between the source (IP cameras) and destination (monitoring center). The video surveillance system requires fast transmission and reliable delivery and high QoS. To improve the QoS and to achieve the optimal path, the SDN architecture is used in this paper. In addition, different routing algorithms are used with different steps. First, we eva
... Show MoreTetradentate complexes type [M (HL) 2] were prepared from the reaction of 2-hydroxy -1, 2-diphynel-ethanone oxime [H2L] and KOH with ( Mn II, Fe II, Co II, Ni II , Cu II and Hg II ), in methanol with (2:1) metal: ligand ratio. The general formula for Cu II and Mn II complexes are [M (HL) 2 Cl.H2O] K, for Co II [Co (HL) 2. H2O] and [M (HL) 2] for the rest of complexes. All compounds were characterised by spectroscopic methods, I.R, U.V-Vis, H.P.L.C, atomic absorption and conductivity measurements chloride content. From the data of these measurements, the proposed molecular structures for Fe II and Hg II complexes are tetrahedrals, while Mn II and Cu II complexes are octahedrals, Ni II complex adopting
... Show MoreTetradentate complexes type [M (HL) 2] were prepared from the reaction of 2-hydroxy -1, 2-diphynel-ethanone oxime [H2L] and KOH with ( Mn II, Fe II, Co II, Ni II , Cu II and Hg II ), in methanol with (2:1) metal: ligand ratio. The general formula for Cu II and Mn II complexes are [M (HL) 2 Cl.H2O] K, for Co II [Co (HL) 2. H2O] and [M (HL) 2] for the rest of complexes. All compounds were characterised by spectroscopic methods, I.R, U.V-Vis, H.P.L.C, atomic absorption and conductivity measurements chloride content. From the data of these measurements, the proposed molecular structures for Fe II and Hg II complexes are tetrahedrals, while Mn II and Cu II complexes are octahedrals, Ni II complex adopting square planar structure and the complex
... Show MoreCassava, a significant crop in Africa, Asia, and South America, is a staple food for millions. However, classifying cassava species using conventional color, texture, and shape features is inefficient, as cassava leaves exhibit similarities across different types, including toxic and non-toxic varieties. This research aims to overcome the limitations of traditional classification methods by employing deep learning techniques with pre-trained AlexNet as the feature extractor to accurately classify four types of cassava: Gajah, Manggu, Kapok, and Beracun. The dataset was collected from local farms in Lamongan Indonesia. To collect images with agricultural research experts, the dataset consists of 1,400 images, and each type of cassava has
... Show MoreRecent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app
... Show MoreIntrusion-detection systems (IDSs) aim at detecting attacks against computer systems and networks or, in general, against information systems. Most of the diseases in human body are discovered through Deoxyribonucleic Acid (DNA) investigations. In this paper, the DNA sequence is utilized for intrusion detection by proposing an approach to detect attacks in network. The proposed approach is a misuse intrusion detection that consists of three stages. First, a DNA sequence for a network traffic taken from Knowledge Discovery and Data mining (KDD Cup 99) is generated. Then, Teiresias algorithm, which is used to detect sequences in human DNA and assist researchers in decoding the human genome, is used to discover the Shortest Tandem Repeat (S
... Show MoreThe emphasis of Master Production Scheduling (MPS) or tactic planning is on time and spatial disintegration of the cumulative planning targets and forecasts, along with the provision and forecast of the required resources. This procedure eventually becomes considerably difficult and slow as the number of resources, products and periods considered increases. A number of studies have been carried out to understand these impediments and formulate algorithms to optimise the production planning problem, or more specifically the master production scheduling (MPS) problem. These algorithms include an Evolutionary Algorithm called Genetic Algorithm, a Swarm Intelligence methodology called Gravitational Search Algorithm (GSA), Bat Algorithm (BAT), T
... Show MoreObjective : Multiple sclerosis (MS) is a common neurological disease deeply linked with the immune-inflammatory disorders whereas the term (multiple) mostly refers to the multi-focal zones of Inflammation caused by lymphocytes and macrophages infiltration besides oligodendrocytes death. Accordingly , the dysfunctional immune system able to damage myelin ( a pivotal component of the central nervous system ) which responsible for communication among neurons. The aim of the present study is to innovate a biochemical relationship between MS and thyroid hormones (THs) by highlighting immunological responses and also to examine the action of Interferon beta (IFNβ) drug on thyroid hormone (THs) and thyroid stimulation hormone (TSH). Materials and
... Show More