Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cycle to increases the complexity of the algorithm detection. An additional shared key between the sender and the receiver is added which is applied before starting the encryption process, that key must be hex-decimal in order to increase the level of security and give enough time to delay the guessing of the secret text by the attackers. The secret message data is concealed using one of the two techniques: either least significant bit (3-LSB) steganography or hiding in green and blue bits. To expedite the concealment process, the cover image is enhanced by applying a median filter, the median filter removes noise from the image while preserving its details. Finally, comparing the results of the two methods to determine which is better for the cover image in terms of PSNR metrics and hiding process time.
Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli
... Show MoreIn networking communication systems like vehicular ad hoc networks, the high vehicular mobility leads to rapid shifts in vehicle densities, incoherence in inter-vehicle communications, and challenges for routing algorithms. It is necessary that the routing algorithm avoids transmitting the pockets via segments where the network density is low and the scale of network disconnections is high as this could lead to packet loss, interruptions and increased communication overhead in route recovery. Hence, attention needs to be paid to both segment status and traffic. The aim of this paper is to present an intersection-based segment aware algorithm for geographic routing in vehicular ad hoc networks. This algorithm makes available the best route f
... Show MoreIn the past two decades, maritime transport traffic has increased, especially in the case of container flow. The BAP (Berth Allocation Problem) (BAP) is a main problem to optimize the port terminals. The current manuscript explains the DBAP problems in a typical arrangement that varies from the conventional separate design station, where each berth can simultaneously accommodate several ships when their entire length is less or equal to length. Be a pier, serve. This problem was then solved by crossing the Red Colobuses Monkey Optimization (RCM) with the Genetic Algorithm (GA). In conclusion, the comparison and the computational experiments are approached to demonstrate the effectiveness of the proposed method contrasted with other
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreThis study was attempted to determine optimum conditions, for Glutathione s-Transferase enzyme, in sera of three groups diabetic patients type1 depending on duration of disease without complications compared with control group. The aim of this study was to find optimum conditions were determined such as (pH, Substrate Concentration, Temperature, Incubation time, Enzyme concentration, and effect of(0.15M)(0.25M) of mono divalent compounds). And to find the kinetics parameters in the three groups of diabetic patients when compared with control. It was found optimum pH(8.5,4.5,2.5,6.5).Temperatures(20cº,40cº,50cº,30cº). Incubation times (7min, 4min, 4min, 5min) substrate concentrations (12µl, 10µl, 5µl, 10µl) enzyme concentra
... Show MoreIn Iraqi patients with acromegaly the present investigation included 40 control group and 70 patients with acromegaly divided 35 patients with Diabetic while another 35 patients without Diabetic, with ages between (29-72) years for the identification of GST activity polymorphisms by present and absent GSTM1, GSTT1, and PCR-RFLP, enzymatic digestions were carried out using BsmAI (Biolabs. England, UK) for GSTP1b and AciI (Biolabs, England, UK) for GSTP1c.the association GSTActivity with GST genotype were investigated in a cohort of Iraq acromegaly patients comparing with the healthy control group. The results show a non-significant change in GSTP1b gene in both groups, while show high significantly in GSTP1c in diabetic and non-diabetic acro
... Show MoreIrak Türkmen edebiyatının divan şiirlerinde büyük simalardan sayılan , ve
Irak Türklerinin en içli şairi olan Osman Mazlum .Şiirleri yalnızlık hem ve kederle
dolu olan şairin , her zaman büyük bir üzüntüye kablandığı için bunun tüm
şiirlerinde yansıtmıştır . Her zaman kaderden şikayetci olan şiirlerinde (Mazlum)
mahlasını kullanmıştır . Şairin klasik edebiyatında önemli bir yeri vardır . Hoyrat
yoluyla edebiyata giren mazlum'un gönül yarası bu aşıkla dolunca feyizlenmeye
ve türlü nağmelerle seslenmeğe başladı . İşte bu güne kadar yazmış olduğu şiirler
o sesler hep ahang , terennüm ve tesavırıdır . Bende bu araştırmada i
... Show MoreAbstract
Our description of the wxperience of any poet depends on the nature the anture of his writing or his style in terms of factors affecting his experience . We have found that al- Maghout is characterized by important poetis properties that characterized all of his poetry such as the ease in compositions that are formed the vocabulary of daily life . This is what constitutes his poetic lexicon that depends on the vocabulary of space , time , and anture . Hispoetry derives its aesthetics from revealing that strains in the text for the sake of surprise and amazement with a simple realism.