30 research outputs found

    USING SPECIAL LETTERS AND DIACRITICS IN STEGANOGRAPHY IN HOLY QURAN

    Get PDF
    Because of the great development that took place in information transfer and communication technologies, the issue of information transfer security has become a very sensitive and resonant issue, great importance must be given to protecting this confidential information. Steganography is one of the important and effective ways to protect the security of this information while it is being transmitted through the Internet, steganography is a technology to hide information inside an unnoticeable envelope object that can be an image, video, text or sound. The Arabic language has some special features that make it excellent covers to hide information from Through the diversity of the Arabic letters from dotted letters in several forms or vowels or special letters, the Holy Qur’an is considered a cover rich in movements and Arabic grammar, which makes it a wide cover for the purpose of concealing information. The Holy Qur’an is a sacred book where it is not permissible to modify, add or move any of the letters or any diacritical mark to it. The algorithm hides the two bits by uses six special letters of Arabic language. Moreover, it checks for the presence of specific Arabic linguistic features referred Arabic diacritics. The proposed system achieved a high ability to hide as in Surat Al-Baqarah (4524 bits) and also (2576 bits) in Surat Al-Imran and in Surat Al-An’am (2318 bits)

    REVIEW ON DETECTION OF RICE PLANT LEAVES DISEASES USING DATA AUGMENTATION AND TRANSFER LEARNING TECHNIQUES

    Get PDF
    The most important cereal crop in the world is rice (Oryza sativa). Over half of the world's population uses it as a staple food and energy source. Abiotic and biotic factors such as precipitation, soil fertility, temperature, pests, bacteria, and viruses, among others, impact the yield production and quality of rice grain. Farmers spend a lot of time and money managing diseases, and they do so using a bankrupt "eye" method that leads to unsanitary farming practices. The development of agricultural technology is greatly conducive to the automatic detection of pathogenic organisms in the leaves of rice plants. Several deep learning algorithms are discussed, and processors for computer vision problems such as image classification, object segmentation, and image analysis are discussed. The paper showed many methods for detecting, characterizing, estimating, and using diseases in a range of crops. The methods of increasing the number of images in the data set were shown. Two methods were presented, the first is traditional reinforcement methods, and the second is generative adversarial networks. And many of the advantages have been demonstrated in the research paper for the work that has been done in the field of deep learning

    A Suggested Lightweight Lossless Compression Approach for Internet of Everything Devices

    Get PDF
    محدودية مساحة التخزين، وارتفاع حركة مرور نقل بيانات المتحسس وكفاءة نقل الطاقة هي عينات من المشاكل الصعبة في تطوير تطبيقات إنترنت كل شيء. وقد تم في هذا البحث معالجه هذه المشاكل من خلال اقتراح طريقة ضغط بدون فقدان للبيانات، والتي تقوم على عمليات خفيفة بالتعقيد. الطريقة المقترحة تعمل بكفاءة حتى مع الاجهزة ذات الأداء المنخفض. وعلاوة على ذلك، تحسن  أجهزة المتحسس بشكل فعال في إنترنت الكل شيء بواسطة التقليل من استهلاك الطاقة والموارد المستخدمة. وبالتالي، توفير الطاقة واطالة عمر أجهزة إنترنت الكل شيء. تم اختبار الطريقة المقترحة، على مجموعتين من البيانات كمعيار اساسي حسب نسبة الضغط المحسوبة على الرسائل بين نمط شخص الى شخص. بالإضافة إلى ذلك، نسبة ضغط على المتحسسات الطبية (دقات القلب ودرجة حرارة الجسم) بين نمط آلة والى شخص من إنترنت الكل شيء. في الاختبارين، الطريقة قد حصلت على مقياس ضغط كبير.Limit storage space, high traffic sensor data transfer and power efficient transmission are samples of the challenging issues in the development of Internet of Everything (IoE) apps. This paper tackles these issues by presenting a suggested lossless compression approach according to lightweight operations. The suggested approach is working efficiently even with a low-performance equipment. Furthermore, enhancing the sensor node effectively of IoE by minimizing energy exhaustion and resource utilizing. Hence, provision power and expanding the age of IoE devices. The suggested approach is evaluated by using two datasets as a benchmark by calculating compression ratio firstly, on messages between person to person and secondly, on healthcare sensors (HeartRate and Body Temperature) between machine to person pattern of IoE.  In two tests, the suggested approach may obtain a significant compression ratio

    Trust factors and their impact on patients satisfaction of private clinics in city of Ramadi - Iraq

    Get PDF
    The target of the research to identify the trust factors represented by (communication, competence, Service Quality) and its impact on the satisfaction of patients private medical clinics in the city of Ramadi, and for the purpose of achieving research objectives and reaching answers to questions (study problem), the Researchersadopted the analytical descriptive approach, a questionnaire was designed as a key tool for collecting preliminary data, and using the method (method) random sample, distributed (384) questionnaire forms to patients reviewing private medical clinics in the city, Of these, 368 were recovered, of which 11 were not eligible (invalid), bringing the number of questionnaires valid for statistical analysis (357) to 357, i.e. a response rate (93%) of recovered questionnaires, and the data analysis and statistically processed by the program (SPSS.V.26) as well as the statistical program (AMOS.V.26) , the most prominent findings of the research were the existence of a correlation and a positive effect with statistical significance between the factors Trust and patient satisfaction In addition, the results showed that the level of Trust of patients through their factors in the private medical clinics researched was at a (medium) level, as the contact came first and then solved the Competence second and the Service Quality iii, as well as the level of patient satisfaction with the medical services provided by the clinics in general was (average), and in the light of those results the Researchersmade a set of recommendations that could help medical clinic staff to enhance and increase the level of Trust of patients with them and strengthen them which reflects positively on the satisfaction of the patients and the permanence and prosperity of their relationship

    A proposed lightweight image encryption using ChaCha with hyperchaotic maps

    Get PDF
    Image encryption plays a pivotal rule in enhancing telecommunications media. Since Privacy is necessary in our daily life in many areas, the personal image will be encrypted when it sent it over the Internet to the recipient to maintain privacy issue. In this paper, the image is encrypted using ChaCha symmetric stream cipher with Hyperchaotic Map. Due to the sensitivity characteristics of initial conditions, pseudo randomness chaotic maps and control parameters in chaotic, Hyperchaotic maps is use, higher security is obtained via using initial seed number, variance of parameters, and unpredictable direction of chaotic. The suggested lightweight image encryption has confirmed robustness contra brute force attacks by providing a massive key space. Furthermore, the suggested lightweight image encryption is eligible to defense from statistical cracking, insecurity of image based on criteria's histogram correlation and entropy

    A Proposed Lossy Image Compression based on Multiplication Table

    Get PDF
    Lately, Internet improved in the various trends, especially, the use of the image increased due to the daily use in several scopes like social media (Facebook, Twitter, WhatsApp, etc.), connected devices (sensor, IP camera, Internet of Things (IoT) Internet of Everything (IoE), etc) and smart phone devices that users interchanged images estimated in the billions. So, images issues in internet can be summarized into two criteria, the first criteria is considered with transmit image size.  The second criteria is considered with low bandwidth through transmission. This paper exhibits a methodology for image compression using an idea of multiplication Table. The suggested algorithm helpful in realizing a preferable achievement by presenting a high Compression Ratio, preserve image quality with a high PSNR, small losing in the original image and efficiently in running time

    Synthesis, Anticancer and Antibacterial Activity of Mannose-based bis-1,2,3-Triazole Derivatives

    Get PDF
           In the current work, aromatic amines and alkyl halides have been converted to the corresponding azides 2a‒d and 4a-d by the reaction with sodium nitrite and sodium azide respectively for amines and sodium azide for halides. Then, dipropargyl ether derivative of D-mannose 8 has been synthesized from diacetone mannose that has been obtained by the treatment of D-mannose (5) with dry acetone in the presence of sulfuric acid. Then, aldol condensation has been used to prepare diol 7 from the mannose diacetonide 6. The reaction of compound 7 with propargyl bromide in alkaline media has been afforded dipropargyl derivative 8. In a parallel step, both dialkyne with aromatic and aliphatic azide have been coupled to produce 1,2,3-triazole derivatives 9a‒d in the presence of Cu(I) salts. All synthesized compounds have been characterized by 1D and 2D NMR spectra alongside with HRMS data. The antibacterial activity against both gram-positive and gram-negative has been tested. Moreover, the anticancer activity has also been evaluated against AMJ13 cell line

    Novel steganography scheme using Arabic text features in Holy Quran

    Get PDF
    With the rapid growth of the Internet and mobile devices, the need for hidden communications has significantly increased. Steganography is a technique introduced for establishing hidden communication, Most steganography techniques have been applied to audio, images, videos, and text. Many researchers used steganography in Arabic texts to take advantage of adding, editing or changing letters or diacritics, but lead to notable and suspicious text. In this paper, we propose two novel steganography algorithms for Arabic text using the Holy Quran as cover text. The fact that it is forbidden to add, edit or change any letter or diacritics in the Holy Quran provides the valuable feature of its robustness and difficulty as a cover in steganography. The algorithms hide secret messages elements within Arabic letters benefiting from the existence of sun letters (Arabic: ḥurūf shamsīyah) and moon letters (ḥurūf qamarīyah). Also, we consider the existence of some Arabic language characteristics represented as small vowel letters (Arabic Diacritics). Our experiments using the proposed two algorithms demonstrate high capacity for text files. The proposed algorithms are robust against attack since the changes in the cover text are imperceptible, so our contribution offers a more secure algorithm that provides good capacity

    Safety issues of capacitor banks in medium voltage systems

    Get PDF
    This paper describes and illustrates the important factors concerning the safety issues of capacitor banks in medium voltage (MV) power system networks. It also explains the protective issues that should be considered. A detailed account on failures and risks of capacitors during the switching operations in power distribution systems is presented. Procedures of safety, techniques of protection, existing solutions to avoid equipment damage, as well as maintaining system safety and reliability have been discussed

    Design a system for an approved video copyright over cloud based on biometric iris and random walk generator using watermark technique

    Get PDF
    Copyright is a tool for preventing anyone forged to copy an electronic work from another person and claim that electronic work is referred to him. Since the identity of the person is always determined by his name and biometrics, there is a concern to handle this information, to preserve the copyright. In this paper, a new idea for copyright technology is used to prove video copyright, by using blind watermarking technique, the ownership information is hidden inside video frames using linear congruential generator (LCG) for adapted the locations of vector features extracted from the name and biometric image of the owner instead of hidden the watermark in the Pseudo Noise sequences or any other feature extraction technique. When providing the watermarked vector, a statistical operation is used to increase randomization state for the amplifier factors of LCG function. LCG provides random positions where the owner's information is stored inside the video. The proposed method is not difficult to execute and can present an adaptable imperceptibility and robustness performance. The output results show the robustness of this approach based on the average PSNR of frames for the embedded in 50 frames is around 47.5 dB while the watermark remains undetectable. MSSIM values with range (0.83 to 0.99)
    corecore