Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
The finite element approach is used to solve a variety of difficulties, including well bore stability, fluid flow production and injection wells, mechanical issues and others. Geomechanics is a term that includes a number of important aspects in the petroleum industry, such as studying the changes that can be occur in oil reservoirs and geological structures, and providing a picture of oil well stability during drilling. The current review study concerned about the advancements in the application of the finite element method (FEM) in the geomechanical field over a course of century.
Firstly, the study presented the early advancements of this method by development the structural framework of stress, make numerical computer solution
... Show MoreReduction of noise and vibration in spur gear experimentally by using asymmetric teeth profiles with tip relief was presented. Both of classical (symmetric) and asymmetric (with and without tip relief) spur gears are used in this work. Gear test rig was constructed to achieve torsional vibration measuring, and two modified cutters are designed and manufactured to achieve tooth profile modifications. First to cut asymmetric gear tooth with pressure angles (14.5o/25 o) without tip relief for loaded and unloaded tooth sides respectively, and second to cut asymmetric gear tooth with pressure angles (14.5o/25 o) for loaded and unloaded tooth sides respectively with tip relief to ach
... Show MoreThe existing investigation explains the consequence of irradiation of violet laser on the structure properties of MawsoniteCu6Fe2SnS8 [CFTS] thin films. The film was equipped by the utilization of semi-computerized spray pyrolysis technique (SCSPT), it is the first time that this technique is used in the preparation and irradiation using a laser. when the received films were processed by continuous red laser (700 nm) with power (>1000mW) for different laser irradiation time using different number of times a laser scan (0, 6, 9, 12, 15 and 18 times) with total irradiation time (0,30,45,60,75,90 min) respectively at room temperature.. The XRD diffraction gave polycrysta
... Show MoreThe phenomenon of negative behavior has studied as a social and psychological phenomenon that effect on the performance and life of workers inside and outside the organization. The adoption of this phenomenon is studied in terms of the role of the internal environment of the organization in addressing this behavior, being the variables belong to the field of organizational behavior to see the results of those variables on the Iraqi organizations, since the specificities of it differ from the rest of the Arab and foreign environments. Therefore, this study focused on testing the relationship of the internal environment of the organization and its role in addressing the negative behavior of the workers.
thi
... Show MoreSuperconducting compound Bi2Sr2-xYxCa2Cu3O10+δ were Synthesized by method of solid state reaction, at 1033 K for 160 hours temperature of the sintering at normal atmospheric pressure where substitutions Yttrium oxide with Strontium. When Y2O3 concentration (0.0, 0.1, 0.2, 0.3, 0.4 and 0.5). All specimens of Bi2Sr2Ca2Cu3O10+δ superconducting compounds were examined. The resistivity of electrical was checked by the four point probe technique, It was found th
six specimens of the Hg0.5Pb0.5Ba2Ca2Cu3-y
Literary works include, for the most part, text thresholds, which are the first entry into reading them and understanding their connotations, and (literary works) vary according to text thresholds, some of which are limited to the title and on the cover page only, and others, in addition to these two thresholds, are based on the dedication threshold too, and others ...
This study takes the story of "Mamo Zain" of the poet Ahmed Al-Khani and his translator Sheikh Muhammad Ramadan Al-Bouti as the field of study, as it is a unique literary work, which included a number of textual thresholds which supported each other and cooperated with the content of the work.
The threshold of dedication in the story of "Mamo Zain" was a spee
... Show More
Abstract
Indeed, being busy with the understanding of religion is the best sort of worship that the almighty God has given each period of time a number of scholars and wise men. They receive what has been passed down to them from their great ancestors, and those who are willing to learn will learn, their students preserve their knowledge through teaching and writing. Thus, the scholars were pioneers in this field due to the value and importance of their knowledge. They have strived in learning, explaining, and writing new subjects.
One of those scholars is sheikh (Abdulrahman Al-Penjweni) who passed away 1319 AH in one of the villages of the city of Sulaimani in Iraq. He was one of the wisest scholars, a br
... Show MoreMethods of speech recognition have been the subject of several studies over the past decade. Speech recognition has been one of the most exciting areas of the signal processing. Mixed transform is a useful tool for speech signal processing; it is developed for its abilities of improvement in feature extraction. Speech recognition includes three important stages, preprocessing, feature extraction, and classification. Recognition accuracy is so affected by the features extraction stage; therefore different models of mixed transform for feature extraction were proposed. The properties of the recorded isolated word will be 1-D, which achieve the conversion of each 1-D word into a 2-D form. The second step of the word recognizer requires, the
... Show More