A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
Aqueous Two Phase System (ATPS) or liquid-liquid extraction is used in biotechnology to recover valuable compounds from raw sources. In Aqueous Two-Phase Systems, many factors influence the Partition coefficient, K, (which is the ratio of protein concentration in the top phase to that in the bottom phase) and the Recovery percentage (Rec%). In this research, two systems of ATPS were used: first, polyethylene glycol (PEG) 4000/Sodium citrate (SC), and the second, PEG8000/ Sodium phosphate (SPH), for the extraction of Bovine Serum Albumin (BSA). The behavior of Rec% and K of pure (BSA) in ATPS has been investigated throughout the study by the effects of five parameters: temperature, concentration of polyethylene glycol (P
... Show MoreUltrasound has been used as a diagnostic modality for many intraocular diseases, due its safety, low cost, real time and wide availability. Unfortunately, ultrasound images suffer from speckle artifact that are tissue dependent. In this work, we will offer a method to reduce speckle noise and improve ultrasound image to raise the human diagnostic performance. This method combined undecimated wavelet transform with a wavelet coefficient mapping function: where UDWT used to eliminate the noise and a wavelet coefficient mapping function used to enhance the contrast of denoised images obtained from the first component. This methods can be used not only as a means for improving visual quality of medical images but also as a preprocessing
... Show MoreFunctionalized-multi wall carbon nanotubes (F-MWCNTs) and functionalized-single wall carbon nanotubes (F-SWCNTs) were well enhanced using CoO Nanoparticles. The sensor device consisted of a film of sensitive material (F-MWCNTs/CoONPs) and (F-SWCNTs/CoO NPs) deposited by drop- casting on an n-type porous silicon substrate. The two sensors perform high sensitivity to NO2 gas at room temperatures. The analysis indicated that the (F-MWCNTs/CoONPs) have a better performance than (F-SWCNTs/CoONPs). The F-SWCNTs/CoONPs gas sensor shows high sensitivity (19.1 %) at RT with response time 17 sec, while F-MWCNTs/CoONPs gas sensor show better sensitivity (39 %) at RT with response time 13 sec. The device shows a very reproducible sensor p
... Show MoreThe applications of hot plasma are many and numerous applications require high values of the temperature of the electrons within the plasma region. Improving electron temperature values is one of the important processes for using this specification in plasma for being adopted in several modern applications such as nuclear fusion, plating operations and in industrial applications. In this work, theoretical computations were performed to enhance electron temperature under dense homogeneous plasma. The effect of power and duration time of pulsed Nd:YAG laser was studied on the heating of plasmas by inverse bremsstrahlung for several values for the electron density ratio. There results for these ca
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
Corrosion Resistance Enhancement for low carbon steel is very important to extend its life service, the coating process is one of the methods which can using to achieve this, and it's the most important in surface treatments to improve the properties of metals and alloys surfaces such as corrosion resistance. In this work, low carbon steel was nitrided and coated with nano zinc using gas phase coating technical, to enhance the resistance of corrosion. The process included adding two layers. The first, a nitride layer, was added by precipitating nitrogen (N) gas, and the second, a zinc (Zn) layer, was added by precipitating Zn. The process of precipitating was carried out at different periods (5, 10, and 15 minutes). Scan electron mi
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreTo expedite the learning process, a group of algorithms known as parallel machine learning algorithmscan be executed simultaneously on several computers or processors. As data grows in both size andcomplexity, and as businesses seek efficient ways to mine that data for insights, algorithms like thesewill become increasingly crucial. Data parallelism, model parallelism, and hybrid techniques are justsome of the methods described in this article for speeding up machine learning algorithms. We alsocover the benefits and threats associated with parallel machine learning, such as data splitting,communication, and scalability. We compare how well various methods perform on a variety ofmachine learning tasks and datasets, and we talk abo
... Show More