Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR
This paper shows the characteristics of temperature and adsorbed (water vapor) mass rate distribution in the adsorber unit which is the key part to any adsorption refrigeration system. The temperature profiles of adsorption/desorption phases (Dynamic Sorption) are measured experimentally under the operating conditions of 90oC hot water temperature, 30oC cooling water temperature, 35oC adsorption temperature and cycle time of 40 min. Based on the temperature profiles, The mass transfer equations for the annulus adsorbent bed are solved to obtain the distribution of adsorption velocity and adsorbate concentration using non-equilibrium
model. The relation between the adsorption velocity with time is investigated during the process of ads
Objectives To assess the feasibility and accuracy of a new prototype robotic implant system for the placement of zygomatic implants in edentulous maxillary models. Methods The study was carried out on eight plastic models. Cone beam computed tomographs were captured for each model to plan the positions of zygomatic implants. The hand-eye calibration technique was used to register the dynamic navigation system to the robotic spaces. A total of 16 zygomatic implants were placed, equally distributed between the anterior and the posterior parts of the zygoma. The placement of the implants (ZYGAN®, Southern Implants) was carried out using an active six-jointed robotic arm (UR3e, Universal Robots) guided by the dynamic navigation coordinate tran
... Show MoreThis study was carried out to assess genetic diversity of ten cultivars of Rice (Oryza sativa L.). One of DNA markers based on Polymerase Chain Reaction (PCR) was used namely DAF markers (DNA Amplification Fingerprint). Six primers were tested, the results showed, that no amplification products using the primers OPD.14 and OPM.5. Two primers (OPX.8 and OPT.2) produced monomorphic band across all cultivars, while only two primers generated polymorphic bands. The number of total bands produced from one of them (OPN.7) were sixteen. Also this primer produced ten polymorphic profiles (DAF patterns) which were unique to the ten cultivars that could be distinguished. The number of total bands generated by primer OPX.1 were thirteen and this prim
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
In cooling water systems, cooling towers play a critical role in removing heat from the water. Cooling water systems are commonly used in industry to dispose the waste heat. An upward spray cooling water systems was especially designed and investigated in this work. The effect of two nanofluids (Al2O3/ water, black carbon /water) on velocity and temperature distributions along reverse spray cooling tower at various concentrations (0.02, 0.08, 0.1, 0.15, and 0.2 wt.%) were investigated, beside the effect of the inlet water temperature (35 ,40, and 45 ͦ C) and water to air flow ratio (L/G) of 0.5, 0.75, and 1. The best thermal performance was found when the working solution contained 0.1 wt.% for each of Al2
... Show MoreThis paper presents the study and analysis, analytically and numerical of circular cylindrical shell pipe model, under variable loads, transmit fluid at the high velocity state (fresh water). The analytical analysis depended on the energy observation principle (Hamilton Principle), where divided all energy in the model to three parts , strain energy, kinetic energy and transmitted energy between flow and solid (kinetic to potential energy). Also derive all important equations for this state and approach to final equation of motion, free and force vibration also derived. the relations between the displacement of model function of velocity of flow, length of model, pipe thickness, density of flowed with location coordinate x-axis and angle
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More