A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. The approach has been employed to use Fuzzy C-Mean clustering (FCM) to find the robust image regions for hiding the type of skin texture features in mice. The steganography was implemented using Least Significant Bit (LSB) method.
The two-neutron halo-nuclei (17B, 11Li, 8He) was investigated using a two-body nucleon density distribution (2BNDD) with two frequency shell model (TFSM). The structure of valence two-neutron of 17B nucleus in a pure (1d5/2) state and in a pure (1p1/2) state for 11L and 8He nuclei. For our tested nucleus, an efficient (2BNDD's) operator for point nucleon system folded with two-body correlation operator's functions was used to investigate nuclear matter density distributions, root-mean square (rms) radii, and elastic electron scattering form factors. In the nucleon-nucleon forces the correlation took account of
... Show MoreThe research examines the mechanism of application of )ISO 21001: 2018( in the Energy Branch- Electromechanical Engineering at the University of Technology to achieve the quality of the educational service to prepare the branch to obtain the certificate of conformity with the requirements of) ISO 21001: 2018(, the necessary data were collected Depending on the (CHEKLIST) of (ISO 21001: 2018), field interviews and records of the concerned department, The researchers reached a number of results, the most prominent of which was the adoption of high quality leadership leaders and their willingness to implement the standard requirements, The university has a basic structure that qualifies it to implement the international standard, as
... Show MoreTo evaluate the shear bond strength and interfacial morphology of sound and caries-affected dentin (CAD) bonded to two resin-modified glass ionomer cements (RMGICs) after 24 hours and two months of storage in simulated body fluid at 37°C.
Sixty-four permanent human mandibular first molars (32 sound and 32 with occlusal caries, following the International Caries Detection and Assessment System) were selected. Each prepared substrate (sound and CAD) was co
The beet armyworm (BAW), Spodoptera exigua (Lepidoptera: Noctuidae) is a highly destructive pest of vegetables and field crops. Management of beet armyworm primarily relies on synthetic pesticides, which is threatening the beneficial community and environment. Most importantly, the BAW developed resistance to synthetic pesticides with making it difficult to manage. Therefore, alternative and environment-friendly pest management tactics are urgently required. The use of pesticidal plant extracts provides an effective way for a sustainable pest management program. To evaluate the use of pesticidal plant extracts against BAW, we selected six plant species (Lantana camara, Aloe vera, Azadirachta indica, Cymbopogon citratus, Nicotiana tabacum ,
... Show More