A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. The approach has been employed to use Fuzzy C-Mean clustering (FCM) to find the robust image regions for hiding the type of skin texture features in mice. The steganography was implemented using Least Significant Bit (LSB) method.
Many objective optimizations (MaOO) algorithms that intends to solve problems with many objectives (MaOP) (i.e., the problem with more than three objectives) are widely used in various areas such as industrial manufacturing, transportation, sustainability, and even in the medical sector. Various approaches of MaOO algorithms are available and employed to handle different MaOP cases. In contrast, the performance of the MaOO algorithms assesses based on the balance between the convergence and diversity of the non-dominated solutions measured using different evaluation criteria of the quality performance indicators. Although many evaluation criteria are available, yet most of the evaluation and benchmarking of the MaOO with state-of-art a
... Show MoreThe aim of this research is controlling the amount of the robotic hand catching force using the artificial muscle wire as an actuator to achieve the desired response of the robotic hand in order to catch different things without destroying or dropping them; where the process is to be similar to that of human hand catching way. The proper selection of the amount of the catching force is achieved through out simulation using the fuzzy control technique. The mechanism of the arrangement of the muscle wires is proposed to achieve good force selections. The results indicate the feasibility of using this proposed technique which mimics human reasoning where as the weight of the caught peace increases, the force increases also with approximatel
... Show MoreIn addition to their high quantities of active chemicals, medicinal plants are well-known for their pharmacological qualities, which include immunological modulation. T Consequently, this study aimed to examine the effects of Avena sativa and Glycyrrhiza glabra leaf extracts on immunological responses as measured by blood cytokine and liver enzyme levels. The phytochemical analysis of Avena sativa crude leaf extracts revealed the presence of alkaloids,flavonoids, tannins, phenolic compounds, and saponins but the absence of resins and violet oils. On the other hand, violet oils, flavonoids, tannins, saponins, and glycosides were detected in significant concentration in Glycyrrhiza glabra ethanolic extract, although resins and phenolic compou
... Show MoreAs asphalt concrete wearing course (ACWC) is the top layer in the pavement structure, the material should be able to sustain stresses caused by direct traffic loading. The objective of this study is to evaluate the influence of aggregate gradation and mineral filler type on Marshall Properties. A detailed laboratory study is carried out by preparing asphalt mixtures specimens using locally available materials including asphalt binder (40-50) penetration grade, two types of aggregate gradation representing SCRB and ROAD NOTE 31 specifications and two types of mineral filler including limestone dust and coal fly ash. Four types of mixtures were prepared and tested. The first type included SCRB specification and
... Show Morecontent Analysis for Some Type of Pillows used in Iraqi houses
As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show MoreLiposomal amphotericin B (Amph B) has been used effectively to treat leishmaniosis, in spite of its high toxicity appeared in some patients. In our study, Amph B was administered in Leishmania donovani that infected BALB/c male mice using different concentrations to evaluate its efficacy challenge against infection as well as its effect in modulating immunity of the host. We observed that low doses with short duration of Amph B as a therapy regime significantly enhanced the induction of Th1 cytokine (INF-γ), but suppressed Th2 cytokine (IL-10) production. Groups of mice infected with L. donovani and treated with Amph B showed clearly increasing in INF-γ level and reduction in IL-10 level in concentration (3, 4, 5 mg/ml/kg) with best resul
... Show MoreHuman cystic echinococcosis caused by Echinococcus granulosus is one of most important and widespreadparasitic zoonoses in the world. The present study was aimed to identify the immunomodulatory activity ofaqueous extract of Cordia myxa fruit since this plant considers one of medically important plants, which is widely used for treatment of numerous diseases, that correlate with the effectiveness of immunized by hydatid cyst fluid antigen HCFAg. Forty Balb/c mice were divided into equal groups, first group was immunized with HCFAg, the second group was treated with aqueous extract of C. muxa fruit, the third group was immunized and treated, the fourth group was as a control. Delayed type hypersensitivity (DTH), Mitotic index (MI) and histop
... Show MoreIn the last few years, the literature conferred a great interest in studying the feasibility of using memristive devices for computing. Memristive devices are important in structure, dynamics, as well as functionalities of artificial neural networks (ANNs) because of their resemblance to biological learning in synapses and neurons regarding switching characteristics of their resistance. Memristive architecture consists of a number of metastable switches (MSSs). Although the literature covered a variety of memristive applications for general purpose computations, the effect of low or high conductance of each MSS was unclear. This paper focuses on finding a potential criterion to calculate the conductance of each MMS rather t
... Show MoreThe most significant function in oil exploration is determining the reservoir facies, which are based mostly on the primary features of rocks. Porosity, water saturation, and shale volume as well as sonic log and Bulk density are the types of input data utilized in Interactive Petrophysics software to compute rock facies. These data are used to create 15 clusters and four groups of rock facies. Furthermore, the accurate matching between core and well-log data is established by the neural network technique. In the current study, to evaluate the applicability of the cluster analysis approach, the result of rock facies from 29 wells derived from cluster analysis were utilized to redistribute the petrophysical properties for six units of Mishri
... Show More