In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .
This work presents an innovative approach to enhancing the performance of concrete with reclaimed asphalt pavement (RAP) aggregates using titanium dioxide (TiO2) nanoparticles. Traditional limestone coarse aggregates were partially replaced with 30% and 50% RAP aggregates; a subset of mixtures containing RAP aggregates was treated with TiO2 nanoparticles. The rheological, mechanical, and long-term properties of concrete, along with changes in its chemical composition following the addition of RAP and TiO2, were evaluated. Results revealed that using 30% and 50% RAP in concrete mixtures reduced their compressive strength by 18% and 27%, respectively. However, using TiO2 in those mixtures enhanced their compressive strength by 8.7% an
... Show MoreAngiogenesis is important for tissue during normal physiological processes as well as in a number of diseases, including cancer. Drug resistance is one of the largest difficulties to antiangiogenesis therapy. Due to their lower cytotoxicity and stronger pharmacological advantage, phytochemical anticancer medications have a number of advantages over chemical chemotherapeutic drugs. In the current study, the effectiveness of AuNPs, AuNPs-GAL, and free galangin as an antiangiogenesis agent was evaluated. Different physicochemical and molecular approaches have been used including the characterization, cytotoxicity, scratch wound healing assay, and gene expression of VEGF and ERKI in MCF-7 and MDA-MB-231 human breast cancer cell line. Re
... Show MoreLeukemia or cancer of the blood is the most common childhood cancer, Acute lymphoblastic leukemia (ALL), is the most common form of leukemia that occurs in children. It is characterized by the presence of too many immature white blood cells in the child’s blood and bone marrow, Acute lymphoblastic leukemia can occur in adults too, treatment is different for children. Children with ALL develop symptoms related to infiltration of blasts in the bone marrow, lymphoid system, and extramedullary sites, such as the central nervous system (CNS). Common constitutional indications consist of fatigue (50%), pallor (25%), fever (60%), and weight loss (26%). Infiltration of blast cells in the marrow cavity and periosteum often lead to bone
... Show MoreConstruction is a hazardous industry with a high number of injuries. Prior research found that many industry injuries can be prevented by implementing an effective safety plan if prepared and maintained by qualified safety personnel. However, there are no specific guidelines on how to select qualified construction safety personnel and what criteria should be used to select an individual for a safety position in the United States (US) construction industry. To fill this gap in knowledge, the study goal was to identify the desired qualifications of safety personnel in the US construction industry. To achieve the study goal, the Delphi technique was used as the main methodology for determining the desired qualifications for constructio
... Show MoreTarget tracking is a significant application of wireless sensor networks (WSNs) in which deployment of self-organizing and energy efficient algorithms is required. The tracking accuracy increases as more sensor nodes are activated around the target but more energy is consumed. Thus, in this study, we focus on limiting the number of sensors by forming an ad-hoc network that operates autonomously. This will reduce the energy consumption and prolong the sensor network lifetime. In this paper, we propose a fully distributed algorithm, an Endocrine inspired Sensor Activation Mechanism for multi target-tracking (ESAM) which reflecting the properties of real life sensor activation system based on the information circulating principle in the endocr
... Show MoreCarbon fiber reinforced polymers (CFRP) were widely used in strengthening reinforced concrete members
in the last few years, these fibers consist mainly of high strength fibers which increase the member capacity in addition to changing the mode of failure of the reinforced concrete beams. Experimental and theoretical investigations were carried to find the behavior of reinforced concrete beams strengthened by CFRP in shear and bending. The experimental work included testing of 12 beams divided into 4 groups; each group contains 3 beams. The following parameters were taken into consideration: - Concrete crushing strength. - CFRP strengthening location (shear strengthening and both shear and flexure strengthening). Reinforced beams were
The sale of facial features is a new modern contractual development that resulted from the fast transformations in technology, leading to legal, and ethical obligations. As the need rises for human faces to be used in robots, especially in relation to industries that necessitate direct human interaction, like hospitality and retail, the potential of Artificial Intelligence (AI) generated hyper realistic facial images poses legal and cybersecurity challenges. This paper examines the legal terrain that has developed in the sale of real and AI generated human facial features, and specifically the risks of identity fraud, data misuse and privacy violations. Deep learning (DL) algorithms are analyzed for their ability to detect AI genera
... Show MoreThe present study aims to investigate the various request constructions used in Classical Arabic and Modern Arabic language by identifying the differences in their usage in these two different genres. Also, the study attempts to trace the cases of felicitous and infelicitous requests in the Arabic language. Methodologically, the current study employs a web-based corpus tool (Sketch Engine) to analyze different corpora: the first one is Classical Arabic, represented by King Saud University Corpus of Classical Arabic, while the second is The Arabic Web Corpus “arTenTen” representing Modern Arabic. To do so, the study relies on felicity conditions to qualitatively interpret the quantitative data, i.e., following a mixed mode method
... Show MoreThe main target of the current study is to investigate the microbial content and mineral contaminants of the imported meat available in the city of Baghdad and to ensure that it is free from harmful bacteria, safe and it compliances with the Iraqi standard specifications. Some trace mineral elements such as (Iron, Copper, Lead, and Cadmium) were also estimated, where 10 brands of these meats were collected. Bacteriological tests were carried out which included (total bacterial count,