Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.
The primary objective of root canal therapy is adequate biomechanical preparation of root canal system followed by 3D obturation.in clinics we are encountered with several anatomical variations, which we need to manage efficiently. One of the major factors responsible for failure of root canal therapy is missed canals. Recent technological advances have given the clinician opportunity to identify anatomical variations and treat them to satisfaction.
<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreIn spite of increasing clinical cases which caused by enteroviruses transferred by water and no documents about entericviruses in the Iraqi water standards. The use of coliphages as an indicator of enteroviruses and fecal pollution were suggested two procedures were applied . The first is Two-Step Enrichment Method and the second is Single Agar Layer Method. Both methods gives good results in Identification of coliphages through testing fifty different water samples (Tap water, Surface water and Bottled water) the study shows the presence of coliphages in fourteen samples.
Basically, this study aims to identify the extent to which Iraqi secondary school students use writing strategies and how proficiency level and students gender could affect writing strategy use. The study also examines the relationship between writing achievement and writing strategy use among Iraqi secondary school students. For this purpose, 140 Iraqi secondary school students were selected randomly from six different schools. Petric and Czarl’s questionnaire (2003) was adopted in the study as an instrument to collect the needed data. A software of SPSS used to analyze the collected data. The findings revealed that secondary school students appeared as low users of writing strategies; low proficient students do not show a sta
... Show MoreHeavy metal consider as major environmental pollutants. Many of industrial wastewater effluents contain a wide range of these heavy metals. The adsorption of Cd2+ and Pb2+ metal ions from aqueous solution by activated carbon was studied. The results showed that maximum adsorption capacity occurred at 486.9×10-3 mg/kg for Pb2+ ion and 548.8×10-3 mg/kg for Cd2+ ion. The adsorption in a mixture of the metal ions had a balancing effect on the adsorption capacity of the activated carbon. The adsorption capacity of each metal ion was affected by the presence of other metal ions rather than its presence individually. The study showed the presence of other heavy metals attribute to the reduction in the activated carbon capacity, and the adsorp
... Show MoreBackground: With the start of the current century, increased the interest in the role of the adipose tissue derived substances that named adipokines in the inflammatory diseases of the human being including the inflammatory periodontal disease, but scientific evidences were not clearly demonstrate the association between these adipokines and periodontal pathologies. Materials and Methods: Forty two subjects male only with normal body mass index were selected for the study with an age ranged (30-39 years). Samples were divided into three groups of 14 subjects in each group based on clinical periodontal parameters; clinically healthy gingiva (group I), gingivitis group (group II) and chronic periodontitis patients group (group III), from whom
... Show MoreThe substantial key to initiate an explicit statistical formula for a physically specified continua is to consider a derivative expression, in order to identify the definitive configuration of the continua itself. Moreover, this statistical formula is to reflect the whole distribution of the formula of which the considered continua is the most likely to be dependent. However, a somewhat mathematically and physically tedious path to arrive at the required statistical formula is needed. The procedure in the present research is to establish, modify, and implement an optimized amalgamation between Airy stress function for elastically-deformed media and the multi-canonical joint probability density functions for multivariate distribution complet
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show More