Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con
... Show MoreThe vacancy of natural resources is undoubtedly limited by time. The sustainable development principle recommends modern technology for its protection and renewal. This project conducted analyses on two underground water sources in the north of Algeria (Mechroha Province). Besides, the use of the hardness factor and the adoption of the titration method, which is the determining the concentration of an unknown solution using a known solution concentration, have permitted the characterization of the examples taken and to verify their conformity to the standard required, the results found showed HT=6.66 French degrees (oF) ) for Ain Guilloume water spring in comparison to Ain Messai water spring H
In this paper, a fast lossless image compression method is introduced for compressing medical images, it is based on splitting the image blocks according to its nature along with using the polynomial approximation to decompose image signal followed by applying run length coding on the residue part of the image, which represents the error caused by applying polynomial approximation. Then, Huffman coding is applied as a last stage to encode the polynomial coefficients and run length coding. The test results indicate that the suggested method can lead to promising performance.
Has influenced technology contact on social values in the Arab community in general and
the Iraqi community in particular whether this positive change or a negative effect on the level
of the individual and society is reflected this influence through socialization and human
relations as well as the behavior of individuals and dealing with others, where the world was
to soon pass changes slow, and the amounts that can be measured and trends can be calculated
and the effect of points can be identified and controlled, but the technological changes and
openness cognitive features that seemed evident in the last decade of the twentieth century
brought about a change in all scales and distances traditional considerations.<
The bearing capacity of layered soil studies was carried out with various approaches such as experimental, theoretical, numerical, and combination of them. This work is focused on the settlement and bearing capacity of shallow foundations subjected to the vertical load placed on the surface of layered soils. The experimental part was performed by manufacturing soil cubic container (570 mm x 570 mm x 570 mm). A model square footing of width 60 mm was placed at the surface of the soil bed. The relative density of sand was constant at 60%, and the clay was prepared with a density of 19.2 (kN/m3) and water content of 14.6%. PLAXIS 3D FEM was used to simulate the experimental tests and performing a parametric study. The results showed
... Show MoreAntimicrobial resistance is one of the most significant threats to public health worldwide. As opposed to using traditional antibiotics, which are effective against diseases that are multidrug-resistant, it is vital to concentrate on the most innovative antibacterial compounds. These innate bacterial arsenals under the term «bacteriocins» refer to low-molecularweight, heat-stable, membrane-active, proteolytically degradable, and pore-forming cationic peptides. Due to their ability to attack bacteria, viruses, fungi, and biofilm, bacteriocins appear to be the most promising, currently accessible alternative for addressing the antimicrobial resistance (AMR) problem and minimizing the negative effects of antibiotics on the host’s m
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThis paper investigates the concept (α, β) derivation on semiring and extend a few results of this map on prime semiring. We establish the commutativity of prime semiring and investigate when (α, β) derivation becomes zero.
In this work, silver (Ag) self-metallization on a polyimide (PI) film was prepared through autocatalytic plating. PI films were prepared through the solution casting method, followed by etching with potassium hydroxide (KOH) solution, sensitization with tin chloride (SnCl2), and the use of palladium chloride (PdCl2) to activate the surface of PI. Energy-dispersive X-ray analysis (EDX) showed the highest peak in the (Ag) region and confirmed the presence of AgNPs. The diffraction peaks at 2θ = 38.2°, 44.5°, 64.6°, and 78.2° represented the 111, 200, 220, and 311 planes of Ag, respectively. The FT–IR an
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.