Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThis paper deals with constructing mixed probability distribution from mixing exponential
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
fashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Background: Odontogenic tumors are a diverse group of lesions with a variety of clinical behavior and histopathologic subtypes, from hamartomatous and benign to malignant. The study aimed to examine the clinical and pathological features of odontogenic tumors in Baghdad over the last 11 years (2011–2021). Materials and Methods: The present retrospective study analyzed all formalin-fixed, paraffin-embedded tissue blocks of patients diagnosed with an odontogenic tumor that were retrieved from archives at a teaching hospital/College of Dentistry in Baghdad University, Iraq, between 2011 and 2021. The diagnosis of each case was confirmed by examining the hematoxylin and eosin stained sections by two expert pathologists. Data from pati
... Show MoreA mixture of algae biomass (Chrysophyta, Cyanophyta, and Chlorophyte) has been investigated for its possible adsorption removal of cationic dyes (methylene blue, MB). Effect of pH (1-8), biosorbent dosage (0.2-2 g/100ml), agitated speed (100-300), particle size (1304-89μm), temperature (20-40˚C), initial dye concentration (20-300 mg/L), and sorption–desorption were investigated to assess the algal-dye sorption mechanism. Different pre-treatments, alkali, protonation, and CaCl2 have been experienced in order to enhance the adsorption capacity as well as the stability of the algal biomass. Equilibrium isotherm data were analyzed using Langmuir, Freundlich, and Temkin models. The maximum dye-sorption capacity was 26.65 mg/g at pH= 5, 25
... Show MoreThe aim of this paper is to present a method for solving third order ordinary differential equations with two point boundary condition , we propose two-point osculatory interpolation to construct polynomial solution. The original problem is concerned using two-points osculatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, many examples are presented to demonstrate the applicability, accuracy and efficiency of the method by compared with conventional method .
The inverse kinematics of redundant manipulators has infinite solutions by using conventional methods, so that, this work presents applicability of intelligent tool (artificial neural network ANN) for finding one desired solution from these solutions. The inverse analysis and trajectory planning of a three link redundant planar robot have been studied in this work using a proposed dual neural networks model (DNNM), which shows a predictable time decreasing in the training session. The effect of the number of the training sets on the DNNM output and the number of NN layers have been studied. Several trajectories have been implemented using point to point trajectory planning algorithm with DNNM and the result shows good accuracy of the end
... Show MoreCorrosion behavior of aluminum alloy 7025 was investigated in hydrochloric acid (pH=1) containing 0.6 mol.dm-3 NaCl in the existence and absence of diverse concentrations of sulphamethoxazole as environmentally friendly corrosion inhibitor over the temperature range (298-313)K. Electrochemical polarization method using potentiostatic technique was employed. The inhibition efficiency has been raised with increased sulphamethoxazole concentration but lessened at temperature increases. The highest efficiency value was 96.5 at 298 K and 2 x10-4 mol.dm-3 concentration of sulphamethoxazole. The sulphamethoxazole adsorption was agreed with Langmuir adsorption isotherm. Some thermodynamic parameter (△Gads) and activation energy (Ea) were determin
... Show More