Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreBacterial meningitis is a leading cause of illness and death worldwide. It is crucial for clinical and public health care, as well as disease control, to identify the meningitis-causing agent promptly. Between June 2021-February 2022, a total of 100 cerebrospinal fluid (CSF) and blood samples were collected from suspected cases of meningitis admitted to Raparin Paediatric Teaching Hospital, Erbil city-Iraq. Cytochemical, cultural, and biochemical tests were conducted, and confirmed by molecular techniques. Bacterial culture findings were positive in 7% of CSF samples and just one positive among blood samples. The most common pathogens found by cultural characteristics and VITEK 2 Compact System were Staphylococcus sciuri in two
... Show MoreThe massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by
... Show MoreIn this paper, a design of the broadband thin metamaterial absorber (MMA) is presented. Compared with the previously reported metamaterial absorbers, the proposed structure provides a wide bandwidth with a compatible overall size. The designed absorber consists of a combination of octagon disk and split octagon resonator to provide a wide bandwidth over the Ku and K bands' frequency range. Cheap FR-4 material is chosen to be a substate of the proposed absorber with 1.6 thicknesses and 6.5×6.5 overall unit cell size. CST Studio Suite was used for the simulation of the proposed absorber. The proposed absorber provides a wide absorption bandwidth of 14.4 GHz over a frequency range of 12.8-27.5 GHz with more than %90 absorp
... Show MoreEmpirical equations for estimating thickening time and compressive strength of bentonitic - class "G" cement slurries were derived as a function of water to cement ratio and apparent viscosity (for any ratios). How the presence of such an equations easily extract the thickening time and compressive strength values of the oil field saves time without reference to the untreated control laboratory tests such as pressurized consistometer for thickening time test and Hydraulic Cement Mortars including water bath ( 24 hours ) for compressive strength test those may have more than one day.
This study was aimed to investigate the association between thyroid disorder and Helicobacter pylori infection in 122 patients (100 females and 22 males )and for comparison, 60 healthy individuals (31females and 29 males),who had no thyroid disorder, were also included in the study. Blood samples were collected from both patients and the healthier individuals. Enzyme Linked Fluorescent Assay (ELFA) technique through using Vitek Immuno Diagnostic Assay System (VIDAS) was applied to measure levels of the thyroid hormones (tri-iodothyronine T3, tetra-iodothyroxine T4) and thyroid stimulating hormone (TSH). From the results obtained, patients were classified into three groups: 40 were
... Show MoreObjective: To investigate the relation between dyslipidemia and insulin resistance where it is one of the metabolic
disorders in patients with type-ΙΙ diabetes mellitus and compare the results with the control group.
Methodology: Blood samples were collected from (35) patients with type-ΙΙ diabetes mellitus, besides (35) healthy
individuals as a control group were enrolled in this study. The age of all subjects range from (20-50). Serum was
used in determination of glucose, insulin, lipid profile (cholesterol (Ch), triglyceride (TG), high-density lipoprotein
(HDL-Ch), low-density lipoprotein (LDL-Ch) and very low-density lipoprotein (VLDL), for patients and control
groups. Insulin resistance (IR) was calculated acco
Average interstellar extinction curves for Galaxy and Large Magellanic Cloud (LMC) over the range of wavelengths (1100 A0 – 3200 A0) were obtained from observations via IUE satellite. The two extinctions of our galaxy and LMC are normalized to Av=0 and E (B-V)=1, to meat standard criteria. It is found that the differences between the two extinction curves appeared obviously at the middle and far ultraviolet regions due to the presence of different populations of small grains, which have very little contribution at longer wavelengths. Using new IUE-Reduction techniques lead to more accurate result.
The Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images inst
... Show More