'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal
A novel technique Sumudu transform Adomian decomposition method (STADM), is employed to handle some kinds of nonlinear time-fractional equations. We demonstrate that this method finds the solution without discretization or restrictive assumptions. This method is efficient, simple to implement, and produces good results. The fractional derivative is described in the Caputo sense. The solutions are obtained using STADM, and the results show that the suggested technique is valid and applicable and provides a more refined convergent series solution. The MATLAB software carried out all the computations and graphics. Moreover, a graphical representation was made for the solution of some examples. For integer and fractional order problems, solutio
... Show MoreTirzepatide is a revolutionary and promising medication with a high impact in the treatment of Obesity and T2DM with their complications. Its efficacy was proven through different trials in achieving favorable weight loss and a significant reduction in glycemic index. It also treated a large diversity of related co-morbidities, including fatty liver, cardiovascular disease, dyslipidemia, and more. Tirzepatide is well tolerated, has a good safety profile, and is highly reliable and suitable for use in a population.
Abstract
The issue of the protection of the environment is a shared responsibility between several destinations and sectors, and constitutes a main subject in which they can achieve sustainable development. In the sectors of government programs can be set up towards the establishment of the government sector to the green environment, so to be the implementati
... Show MoreIn this work, using GPS which has best accuracy that can be established set of GCPs, also two satellite images can be used, first with high resolution QuickBird, and second has low resolution Landsat image and topographic maps with 1:100,000 and 1:250,000 scales. The implementing of these factors (GPS, two satellite images, different scales for topographic maps, and set of GCPs) can be applying. In this study, must be divided this work into two parts geometric accuracy and informative accuracy investigation. The first part is showing geometric correction for two satellite images and maps.
The second part of the results is to demonstrate the features (how the features appearance) of topographic map or pictorial map (image map), Where i
Soil pH is one of the main factors to consider before undertaking any agricultural operation. Methods for measuring soil pH vary, but all traditional methods require time, effort, and expertise. This study aimed to determine, predict, and map the spatial distribution of soil pH based on data taken from 50 sites using the Kriging geostatistical tool in ArcGIS as a first step. In the second step, the Support Vector Machines (SVM) machine learning algorithm was used to predict the soil pH based on the CIE-L*a*b values taken from the optical fiber sensor. The standard deviation of the soil pH values was 0.42, which indicates a more reliable measurement and the data distribution is normal.
In recent years, the Global Navigation Satellite Services (GNSS) technology has been frequently employed for monitoring the Earth crust deformation and movement. Such applications necessitate high positional accuracy that can be achieved through processing GPS/GNSS data with scientific software such as BERENSE, GAMIT, and GIPSY-OSIS. Nevertheless, these scientific softwares are sophisticated and have not been published as free open source software. Therefore, this study has been conducted to evaluate an alternative solution, GNSS online processing services, which may obtain this privilege freely. In this study, eight years of GNSS raw data for TEHN station, which located in Iran, have been downloaded from UNAVCO website
... Show MoreArtificial roughness on the absorber plate of a Solar Air Heater (SAH) is a popular technique for increasing its effective efficiency. The study investigated the effect of geometrical parameters of discrete multi-arc ribs (DMAR) installed below the SAH absorber plate on the effective efficiency. The effects of major roughness factors, such as number of gaps (Ng = 1-4), rib pitch (p/e = 4-16), rib height (e/D = 0.018-0.045), gab width (wg/e = 0.5-2), angle of attack ( = 30-75), and Reynolds number (Re= 2000-20000) on the performance of a SAH are studied. The performance of the SAH is evaluated using a top-down iterative technique. The results show that as Re rises, SAH-effective DMAR's efficiency first ascends to a specified value o
... Show MoreIn this paper, an experimental study has been conducted regarding the indication of resonance in chaotic semiconductor laser. Resonant perturbations are effective for harnessing nonlinear oscillators for various applications such as inducing chaos and controlling chaos. Interesting results have been obtained regarding to the effect of the chaotic resonance by adding the frequency on the systems. The frequency changes nonlinear dynamical system through a critical value, there is a transition from a periodic attractor to a strange attractor. The amplitude has a very relevant impact on the system, resulting in an optimal resonance response for appropriate values related to correlation time. The chaotic system becomes regular under
... Show MoreDiscrete Raman amplifier have many attractive aspects over rare-earth doped fiber amplifier such as (EDFA) including arbitrary gain band, better adjustability of gain shape, and better linearity. This paper shows that discrete Raman amplifier has higher gain in bidirectional pumping than counter pumping. The gain increases with increasing fiber length, and the noise figure remain at the same value for short fiber length.
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show More