Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Proteus mirabilis ? -lactamase of local isolates number 4TF represent karkh side and 20TF represent rusafa side of Baghdad were extracted and purified 23.17, 25.23 fold with yield of 36.66 %, 37.5% and specific activity 11.8, 12.6 of unit/ mg protein by DEAE –cellulose and Sepharose 4B (respectively ).Molecular weight of both enzyme was about 35500 Dalton determined by gel filtration. The study indicated that the isoelectric point of purified ? -lactamase that extracted from isolate number 4TF and 20TF was 5.4.
Single long spiral tube column pressure swing adsorption (PSA) unit, 25 mm diameter, and 6 m length was constructed to study the separation of water from ethanol at azeotropic concentration of 95 wt%. The first three meters of the column length acted as a vaporizer and the remaining length acted as an adsorber filled by commercial 3A zeolite. The effect of pressure, temperature and feed flow rate on the product ethanol purity, process recovery and productivity were studied. The results showed that ethanol purity increased with temperature and pressure and decreased with feed flow rate. The purity decreased with increasing productivity. The purity range was 98.9 % to 99.6 %, the recovery range was 0.82 to 0.92 and the productivity range w
... Show MoreIn this paper, a compression system with high synthetic architect is introduced, it is based on wavelet transform, polynomial representation and quadtree coding. The bio-orthogonal (tap 9/7) wavelet transform is used to decompose the image signal, and 2D polynomial representation is utilized to prune the existing high scale variation of image signal. Quantization with quadtree coding are followed by shift coding are applied to compress the detail band and the residue part of approximation subband. The test results indicate that the introduced system is simple and fast and it leads to better compression gain in comparison with the case of using first order polynomial approximation.
Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreIn this paper, a simple fast lossless image compression method is introduced for compressing medical images, it is based on integrates multiresolution coding along with polynomial approximation of linear based to decompose image signal followed by efficient coding. The test results indicate that the suggested method can lead to promising performance due to flexibility in overcoming the limitations or restrictions of the model order length and extra overhead information required compared to traditional predictive coding techniques.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreIn this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i
This research aims to solve the problem of selection using clustering algorithm, in this research optimal portfolio is formation using the single index model, and the real data are consisting from the stocks Iraqi Stock Exchange in the period 1/1/2007 to 31/12/2019. because the data series have missing values ,we used the two-stage missing value compensation method, the knowledge gap was inability the portfolio models to reduce The estimation error , inaccuracy of the cut-off rate and the Treynor ratio combine stocks into the portfolio that caused to decline in their performance, all these problems required employing clustering technic to data mining and regrouping it within clusters with similar characteristics to outperform the portfolio
... Show MoreDuring the last few years, the greener additives prepared from bio-raw materials with low-cost and multifunctional applications have attracted considerable attention in the field of lubricant industry. In the present work, copolymers derived from sunflower and linseed oils with decyl methacrylate were synthesized by a thermal method using benzoyl peroxide (BPO) as a radical initiator. Direct polymerization of fatty acid double bonds in the presence of a free radical initiator results in the development of environmentally friendly copolymeric additives (Co-1 and Co-2). Fourier Transform Infrared (FTIR) and Proton Nuclear Magnetic Resonance (1H-NMR) were used to characterize the resulting copolymers. Thermal decomposition of copolymers was de
... Show MoreThe mixed-spin ferrimagnetic Ising system consists of two-dimensional sublattices A and B with spin values and respectively .By used the mean-field approximation MFA of Ising model to find magnetism( ).In order to determined the best stabile magnetism , Gibbs free energy employ a variational method based on the Bogoliubov inequality .The ground-state (Phase diagram) structure of our system can easily be determined at , we find six phases with different spins values depend on the effect of a single-ion anisotropies .these lead to determined the second , first orders transition ,and the tricritical points as well as the compensation phenomenon .