Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the produced key is used to determine the starting pixel in each block for hiding and the direction of hiding (clockwise or anticlockwise). The proposed method is applied on many images with different embedding rate, and many metrics are used to evaluate the performance of the proposed method such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), correlation factor (CF) and Structural Similarity Index Measure (SSIM). It achieves in average 52.225 dB of PSNR, 0.3215 of MSE, 0.9952 of SSIM and 0.9997 of CF with embedding rate 1.5.
Background: Fractures of patella constitute 1% of all fractures. Various techniques have been described for internal fixation of patella fractures. Superiority of one technique over the other has long been debated. Objective: We reviewed a series of seventy patients with transverse or comminuted fractures of patella treated with cerclage and tension band wiring technique to assess if it had any advantages over k. wires and tension band wiring technique. Type of the study: Retrospective study. Methods; Seventy patients with displaced patella fracture, with a mean age of 47 years (range 13-75) were divided into two groups :group A 36 patients were treated with cerclage and tension bands technique ,and group B 34 patients were fixed by 2 K.
... Show MoreDetecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate
... Show MoreWith the World Health Organization reporting over 30,000 deaths and 200,000 to 400,000 new cases annually, visceral leishmaniasis is a serious disease affecting some of the world's poorest people. As drug resistance continues to rise, there is a huge unmet need to improve treatment. Miltefosine remains one of the main treatments for leishmaniasis, yet its mode of action (MoA) is still unknown. Understanding the MoA of this drug and parasite response to treatment could help pave the way for new and more successful treatments for leishmaniasis. A novel method has been devised to study the metabolome and lipidome of
In this paper, we study the growth of solutions of the second order linear complex differential equations insuring that any nontrivial solutions are of infinite order. It is assumed that the coefficients satisfy the extremal condition for Yang’s inequality and the extremal condition for Denjoy’s conjecture. The other condition is that one of the coefficients itself is a solution of the differential equation .
الصيغة العامة للمعقدات الجديدة [M2(BDS)Cl4] الناتجة من تفاعل الليكاند الجديد] ن1,ن4-ثنائي(1أ –بنزو]د[ اميدازول-2-يل)-ن1,ن4-ثنائي(4-ثنائي مثيل امينو) بنزيل) سكسنمايد[ (BDS) مع الايونات الفلزية الكادميوم, الكوبلت, الزئبق, النحاس والنيكل. تم اشتقاق هذا الليكاند من تفاعل المواد الثلاث 4-(ثنائي ميثيل أمينو) بنزالدهيد، 2-أمينو بنزيميدازول، وكلوريد السكسينيل. تم تشخيص المركبات باستخدام مطيافية طيف الاشعة تحت الحمراء وطيف الرن
... Show MoreCharge transfer complex formation method has been applied for the spectrophotometric determination of erythromycin ethylsuccinate, in bulk sample and dosage form. The method was accurate, simple, rapid, inexpensive and sensitive depending on the formed charge- transfer complex between cited drug and, 2,3- Dichloro-5,6-dicyano-p- benzoquinone (DDQ) as a chromogenic reagent. The formed complex shows absorbance maxima at 587 nm against reagent blank. The calibration graph is linear in the ranges of (10 - 110) μg.mL-1 with detection limit of 0.351μg.mL-1. The results show the absence of interferences from the excipients on the determination of the drug. Therefore the proposed method has been successfully applied for the determination of eryth
... Show MoreThe non static chain is always the problem of static analysis so that explained some of theoretical work, the properties of statistical regression analysis to lose when using strings in statistic and gives the slope of an imaginary relation under consideration. chain is not static can become static by adding variable time to the multivariate analysis the factors to remove the general trend as well as variable placebo seasons to remove the effect of seasonal .convert the data to form exponential or logarithmic , in addition to using the difference repeated d is said in this case it integrated class d. Where the research contained in the theoretical side in parts in the first part the research methodology ha
... Show MoreDue to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
BACKGROUND: The rapidly growing knowledge regarding factors controlling tumour growth, with the new modalities of therapy acting on the biological activity of the tumours draw the attention of most cancer researches nowadays and represent a major focus for clinical oncology practice. For the detection of HER2/neu protein overexpression and gene amplification, immunohistochemistry (IHC) and in-situ hybridisation (ISH) is the recommended techniques, respectively, with high concordance between the two techniques. The current United Kingdom recommendations for HER2/neu testing are either for a two-tier system using IHC with reflex ISH testing in equivocal positive cases, or a one-tier ISH strategy. AIM: To compare the results of HER2/neu gene s
... Show More