Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
The Character is one of the elements of Storytelling, as it is the center of the plot, making it the basis on which the talk is about. The talk is the portrayal of the character while they’re acting; the novelist presents the character by interacting with the events, and the extent of the negative and positive appearing impact on the character. It should be noted that everyone has two personalities or more, each one appearing in a different position or situation. For instance, a man can be a father, a lover, an employee, a son or anyone else .. in another position, he might be a master, and in another a looser begging for the mercy of his humiliator, and sometimes he can show weakness to the one he loves, or show strength to his enemie
... Show MoreAbstract: Background: Optical biosensors offer excellent properties and methods for detecting bacteria when compared to traditional analytical techniques. It allows direct detection of many biological and chemical materials. Bacteria are found in the human body naturally non-pathogenic and pathologically, as they are found in other living organisms. One of these bacteria is Escherichia coli (E. coli) which are found in the human body in its natural and pathogenic form. E.coli bacteria cause many diseases, including Stomach, intestines, urinary system infections, and others. The aim of this study: is sensing and differentiation between normal flora and pathogenic E.coli. Material and method:
... Show MoreTourism plays an important role in Malaysia’s economic development as it can boost business opportunity in its surrounding economic. By apply data mining on tourism data for predicting the area of business opportunity is a good choice. Data mining is the process that takes data as input and produces outputs knowledge. Due to the population of travelling in Asia country has increased in these few years. Many entrepreneurs start their owns business but there are some problems such as wrongly invest in the business fields and bad services quality which affected their business income. The objective of this paper is to use data mining technology to meet the business needs and customer needs of tourism enterprises and find the most effective
... Show MoreRadiation treatment has long been the conventional approach for treating nasopharyngeal cancer (NPC) tumors due to its anatomic features, biological characteristics, and radiosensitivity. The most common treatment for nasopharyngeal carcinoma is radiotherapy. This study aimed to assess the better quality of radiotherapy treatment techniques using intensity-modulated radiotherapy (IMRT) and volumetric-modulated arc therapy (VMAT). The VMAT and IMRT are comparative techniques. Forty patients with nasopharyngeal carcinoma and forwarded for radiotherapy were treated with both advanced techniques, IMRT and VMAT, using eclipse software from Varian. The x-ray energy was set at 6 MV. The total prescribed dose was 70 Gy. The results show that the
... Show MoreThe research involved a rapid, automated and highly accurate developed CFIA/MZ technique for estimation of phenylephrine hydrochloride (PHE) in pure, dosage forms and biological sample. This method is based on oxidative coupling reaction of 2,4-dinitrophenylhydrazine (DNPH) with PHE in existence of sodium periodate as oxidizing agent in alkaline medium to form a red colored product at ʎmax )520 nm (. A flow rate of 4.3 mL.min-1 using distilled water as a carrier, the method of FIA proved to be as a sensitive and economic analytical tool for estimation of PHE.
Within the concentration range of 5-300 μg.mL-1, a calibration curve was rectilinear, where the detection limit was 3.252 μg.mL
The optical absorption data of Hydrogenated Amorphous Silicon was analyzed using a Dunstan model of optical absorption in amorphous semiconductors. This model introduces disorder into the band-band absorption through a linear exponential distribution of local energy gaps, and it accounts for both the Urbach and Tauc regions of the optical absorption edge.Compared to other models of similar bases, such as the O’Leary and Guerra models, it is simpler to understand mathematically and has a physical meaning. The optical absorption data of Jackson et al and Maurer et al were successfully interpreted using Dunstan’s model. Useful physical parameters are extracted especially the band to the band energy gap , which is the energy gap in the a
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreIn this paper, an enhanced artificial potential field (EAPF) planner is introduced. This planner is proposed to rapidly find online solutions for the mobile robot path planning problems, when the underlying environment contains obstacles with unknown locations and sizes. The classical artificial potential field represents both the repulsive force due to the detected obstacle and the attractive force due to the target. These forces can be considered as the primary directional indicator for the mobile robot. However, the classical artificial potential field has many drawbacks. So, we suggest two secondary forces which are called the midpoint
... Show MoreThis research estimates the effect of independent factors like filler (3%, 6%, 9%, 11% weight fraction), normal load (5N, 10N, 15N), and time sliding (5,7 , 9 minutes) on wear behavior of unsaturated polyester resin reinforced with jute fiber and waste eggshell and, rice husk powder composites by utilizing a statistical approach. The specimens polymeric composite prepared from resin unsaturated polyester filled with (4% weight fraction) jute fiber, and (3%, 6%, 9%, 11% weight fraction) eggshell, and rice husk by utilizing (hand lay-up) molding. Dry sliding wear experiments were carried utilizing a standard (pin on disc test setup) following a well designed empirical schedule that depends on Taguchi’s experimental design L9 (MINIT
... Show More