In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .
The preferred route of drug administration is the oral route, but drugs with narrow absorption window in the gastrointestinal tract are still challenging. The ability to extend and monitor the gastric emptying time is a valuable tool for processes remaining in the stomach longer than other traditional dosage forms.
The purpose of this study was to formulate and evaluate gastroretentive superporous hydrogel (SPH) of carvedilol with view to improve its solubility and increase gastric residence time in order to get sustained release formulas via utilization of various kinds and concentrations of hydrophilic polymers then after, incorporate the best prepared formula into capsules.
Sixteenth formulae of SPH h
... Show MoreQ fever is an infectious disease of animals and humans, caused by globally distributed C. burnetii. In Iraq, there are no previous studies associated with the detection of the organism in cattle. An overall of 130 lactating cows were submitted to direct collection of milk samples. Initially, the samples of milk were tested using the molecular polymerase chain reaction (PCR) assay targeting three genes (16S rRNA, IS1111a transposase, and htpB). However, positive results (18.46%; 24/130) were detected only with the 16s rRNA gene. Concerning risk factors, the highest prevalence of C. burnetii was showed in the district of Badra (42.86%), whereas the lowest - in Al-Numaniyah and Al-Suwaira districts (P=0.025). There was no significant v
... Show MorePseudomonas aeruginosa produces an extracellular bioï¬lm matrix that consists of nucleic acids, exopolysaccharides, lipid vesicles, and proteins. Alginate, Psl and Pel are three exopolysaccharides that constitute the main components in biofilm matrix, with many biological functions attributed to them, especially concerning the protection of the bacterial cell from antimicrobial agents and immune responses. A total of 25 gentamicin-resistant P. aeruginosa selected isolates were enrolled in this study. Biofilm development was observed in 96% of the isolates. In addition, the present results clarified the presence of pelA and pslA in all the studied isolates. The expression of these genes was very low. Even though all biof
... Show MoreIn the years recently city planning projects have been confirmed sustainable high concentration on planning streets and pedestrian paths being the most prominent component of the urban structure in the city and these me and diverse departments link the city’s sectors and serve as a space for economic, service, and social activities. On the other hand, pedestrian traffic is an essential component of the various means of transportation within the city. Suffer cities in the Middle East and Arab cities in particular are neglecting pedestrian paths in the vital urban environment. Vehicle control mechanisms on roads, and changing the uses of pedestrian paths as result of encroaching on the sidewalks designated for pedestrians. Which leads to a
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreReverse shoulder arthroplasty is an increasingly common surgical intervention. However there are concerns and known limitations in relation to such joint replacement, while novel designs of reverse shoulder prostheses continue to appear on the market. Many claim to offer improvements over older designs but such assertions are difficult to validate when there is no consensus as to how such implants should be tested in vitro or even if such testing is necessary. In order to permit appropriate in vitro testing of reverse shoulder prostheses a unique, multi-station test rig was designed which was capable of applying motion in three axes to test prostheses. The shoulder simulator can apply up to 110° of motion in the flexion–extension and abd
... Show MoreElevated C-Reactive Protein (CRP) level in serum is a risk factor for type 2 diabetes ,this relationship is likely to be the cause it means elevated CRP leads to T2D in future . Our objective was to examine CRP in male Type 2 Diabetes(T2D) patients in different age ,we studied 120 male subjects divided to two groups according to their age. First group A age (31 - 40) year old ,60 person )30 control & 30 T2D patients(,3 person for each same age: second group B age (41 – 50) years old ,60 person )30 control & 30 T2D patients(,3 person for each same age. We examined blood sugar ,cholesterol and CRP in each group. and we toke the mean of samples in the same age in each data in all the 4 groups. Our data shows that CRP
... Show MoreFrom a medical perspective, autoimmunity reflects the abnormal behaviour of a human being. This state is shaped when the defense of an organism betrays its own tissues. Allegedly, the immune system should protect the body against attacking cells. When an autoimmune disease attacks, it results in perilous actions like self-destruction. However, from a psychological perspective, the French philosopher Jacques Derrida (1930-2004) explains that autoimmunity harms both the self and the other. As a result, the organ disarms the betraying cells, as the immune system cannot provide necessary protection. From a literary perspective, Derrida has termed autoimmunity as deconstruction for almost forty years. Autoimmunity starts with the stage of a norm
... Show More