Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show MoreThe need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show MoreBackground: Stroke defined by diminished cerebral blood flow, results in brain damage and neurological impairments. It often leads to considerable difficulties, such as limited mobility and compromised hand function, usually manifesting as a weakening in the ability to open and shut the hand. Objective: The study evaluates the differences between opening and closing hands when utilizing a soft robot. Methods: The study was conducted in the Mosul Specialist Rehabilitation Center which involved 68 participants, all over 20 years old, with visual impairments. The Iranian Clinical Trials Registry and Ministry of Planning approved the study, The Fugl-Meyer Assessment for Upper Extremity Action Research Arm Test, and Arm Motor Ability Test were
... Show MoreThe regressor-based adaptive control is useful for controlling robotic systems with uncertain parameters but with known structure of robot dynamics. Unmodeled dynamics could lead to instability problems unless modification of control law is used. In addition, exact calculation of regressor for robots with more than 6 degrees of freedom is hard to be calculated, and the task could be more complex for robots. Whereas the adaptive approximation control is a powerful tool for controlling robotic systems with unmodeled dynamics. The local (partitioned) approximation-based adaptive control includes representation of the uncertain matrices and vectors in the robot model as finite combinations of basis functions. Update laws for the weighting matri
... Show MoreThe goals of endodontic preparation were to shape and clean the space of the root canal and remove microorganisms, affected dentin and pulp, the apical foramen and the canal curve should be protected from being transported during endodontic canal preparation. The aim of this study was to evaluate the curve straightening of curved root canals and apical transportation after preparation with four rotary systems. Forty mesial roots of the lower 1st molars teeth only the mesiobuccal canals were used, these roots were immersed into cold clear acrylic , the teeth roots divided into four groups according to rotary system used for preparation of the canals (ten roots for each group):. group I: ProTaper Next rotary system, group II: IRaCe Plus rotar
... Show MoreIt is clear that correct application of antibiotic prophylaxis can reduce the incidence of infection resulting from the bacterial inoculation in a variety of clinical situations; it cannot prevent all infections any more than it can eliminate all established infections. Optimum antibiotic prophylaxis depends on: rational selection of the drug(s), adequate concentrations of the drug in the tissues that are at risk, and attention to timing of administration. Moreover, the risk of infection in some situations does not outweigh the risks which attend the administration of even the safest antibiotic drug. The aim of this study was to comp
... Show MoreAW Tarik, AW Ali T, A Salah, Journal of faculity of medicine Baghdad university, 2014 - Cited by 3
It is clear that correct application of antibiotic prophylaxis can reduce the incidence of infection resulting from the bacterial inoculation in a variety of clinical situations; it cannot prevent all infections any more than it can eliminate all established infections. Optimum antibiotic prophylaxis depends on: rational selection of the drug(s), adequate concentrations of the drug in the tissues that are at risk, and attention to timing of administration. Moreover, the risk of
... Show More