Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm
Single long spiral tube column pressure swing adsorption (PSA) unit, 25 mm diameter, and 6 m length was constructed to study the separation of water from ethanol at azeotropic concentration of 95 wt%. The first three meters of the column length acted as a vaporizer and the remaining length acted as an adsorber filled by commercial 3A zeolite. The effect of pressure, temperature and feed flow rate on the product ethanol purity, process recovery and productivity were studied. The results showed that ethanol purity increased with temperature and pressure and decreased with feed flow rate. The purity decreased with increasing productivity. The purity range was 98.9 % to 99.6 %, the recovery range was 0.82 to 0.92 and the productivity range w
... Show MoreThis study involves the synthesis of new azodye, derived from 2-Amino-6ethoxybenzothiazole and 4-Chloro-3,5-dimethylphenol . The characterization of dye has been described by C.H.N. The TG , IR and Visible. spectroscopic techniques .The acid-base properties were studied at different pH values . The ionization and protonation constants of dye were determined. Solvents effects were also studied at different solvents polarities . The optimum conditions of this formation of complex with Fe(III) were investigated . The analytical applications of this azodye , were studied like; using it as acid-base indicator , and for the determination of nitrite ions
Proteus mirabilis ? -lactamase of local isolates number 4TF represent karkh side and 20TF represent rusafa side of Baghdad were extracted and purified 23.17, 25.23 fold with yield of 36.66 %, 37.5% and specific activity 11.8, 12.6 of unit/ mg protein by DEAE –cellulose and Sepharose 4B (respectively ).Molecular weight of both enzyme was about 35500 Dalton determined by gel filtration. The study indicated that the isoelectric point of purified ? -lactamase that extracted from isolate number 4TF and 20TF was 5.4.
In thisipaper, we introduce the concepts of the modified tupledicoincidence points and the mixed finiteimonotone property. Also the existenceiand uniquenessiof modified tupled coincidenceipoint is discusses without continuous condition for mappings having imixed finite monotoneiproperty in generalizedimetric spaces.
Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreIn this paper, a compression system with high synthetic architect is introduced, it is based on wavelet transform, polynomial representation and quadtree coding. The bio-orthogonal (tap 9/7) wavelet transform is used to decompose the image signal, and 2D polynomial representation is utilized to prune the existing high scale variation of image signal. Quantization with quadtree coding are followed by shift coding are applied to compress the detail band and the residue part of approximation subband. The test results indicate that the introduced system is simple and fast and it leads to better compression gain in comparison with the case of using first order polynomial approximation.
Computer software is frequently used for medical decision support systems in different areas. Magnetic Resonance Images (MRI) are widely used images for brain classification issue. This paper presents an improved method for brain classification of MRI images. The proposed method contains three phases, which are, feature extraction, dimensionality reduction, and an improved classification technique. In the first phase, the features of MRI images are obtained by discrete wavelet transform (DWT). In the second phase, the features of MRI images have been reduced, using principal component analysis (PCA). In the last (third) stage, an improved classifier is developed. In the proposed classifier, Dragonfly algorithm is used instead
... Show MoreIn this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i