Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
Abstract. This study gives a comprehensive analysis of the properties and interactions of fibrewise maximal and minimal topological spaces. Fibrewise topology extends classical topological concepts to structured spaces, providing a thorough understanding of spaces that vary across different dimensions. We study the basic theories, crucial properties, and characterizations of maximal and minimal fibrewise topological spaces. We investigate their role in different mathematical contexts and draw connections with related topological concepts. By providing exact mathematical formulations and comprehensive examples, this abstract advances the fields of topology and mathematical analysis by elucidating the unique properties and implications of fib
... Show MoreThe Hartley transform generalizes to the fractional Hartley transform (FRHT) which gives various uses in different fields of image encryption. Unfortunately, the available literature of fractional Hartley transform is unable to provide its inversion theorem. So accordingly original function cannot retrieve directly, which restrict its applications. The intension of this paper is to propose inversion theorem of fractional Hartley transform to overcome this drawback. Moreover, some properties of fractional Hartley transform are discussed in this paper.
Abstract
There have been a number of positive developments in inclusive education in many different countries, recognizing that all students, including those with disabilities, have a right to education. Around the world, educators, professionals, and parents are concerned about including children with disabilities in mainstream schools along with their peers. As a result of this trend, a number of factors are contributing, including the increasing importance of education in achieving social justice for pupils with special education needs; the right of individuals with disabilities to attend mainstream schools together with their typically developing peers; the benefit of equal opportunities for everyone in achie
... Show MoreI attended some amides non grassy substitutes such as acrylic compounds Amaid Electron Amaid and Alsinamamaid interaction unsaturated acids such as acrylic acid or Ketronk ????????? with primary amines Malkhtlfah of acrylic monomers Alamayd
Isthmus life and prepare for it
In this work the design and construction of optical pumping system was presented. The parameters of the pumping source to obtain discharge current density sufficient to shift the flash lamp spectrum towards uv portion of spectrum were measured.The current density was supplied to the flash lamp must be greater than 4000Amp./cm2 to obtain the spectral range wavelength lies between 0.2 and 0.35?m. The current density was obtained by a capacitor 50?F, at 7KV discharge voltage. The applied electrical energy to the flash lamp was more than 1200 J, and the current density was around 5000 Amp./cm2.The electrical parameters of the flash lamp were calculated. The impedance parameters(K0) from the voltage and the peak current pulse was measured in ran
... Show MoreThe MTX was converted to MTX nanoparticles by the modified method based on changing the pH gradually with exposure to ultrasound and shaking , changing the pH with exposure to ultrasound plays an significant role in the formation of nanoparticles, and this is shown in some previous studies. As the change in pH affects the nature of bonding between molecules, as well as the strength of bonding that depends on the change of electrical charges The exposure to ultrasound waves will greatly affect the breakdown of large particles into small particles that reach the level of nanoparticles. The MTX NPs formation was characterized by UV-Vis spectra analysis , Atomic force microscopy (AFM) analysis, Scanning electron microscope (SEM) and Fou
... Show MoreGestational Diabetes Mellitus is known as carbohydrate intolerance first detected during pregnancy. Pregnancy is periods of intense hormonal changes. The aim of the present study was to investigate a possible relation between the changes in serum hormones such as Luteinizing hormone (LH) , follicle stimulating hormone(FSH), Progesterone, and Prolactin with gestational diabetes mellitus. Thirty patients with gestational diabetes mellitus aged (22 -40) year attending the national center for treatment and research of diabetes/ AL-Mustansiriya University in Baghdad and 29 controls aged (20-39) year were participated. Hormonal tests including, FSH, LH, Progesterone, and Prolactin were detected by using Enzyme Linked Fluorescent Assay (ELFA) k
... Show MoreDue to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many application
... Show MoreAbstract. In this work, some new concepts were introduced and the relationship between them was studied. These concepts are filter directed-toward, nano-closure-directed-toward and nano-closure-converge to point, and some theories and results about these concepts were presented. A definition almost-nano-converges for set, almost-nano-cluster-point, and definition of quasi-nano-Hausdorff-closed and was also called nano-Hausdorff-closed relative, were also presented several theories related to these definitions were presented and the relationship between them was studied . We also provided other generalizations, including nano closure continuous mappings and it was also called as nano-weaklycontinuous- mappings, as well as providing a definit
... Show More