Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Under-reamed piles are piles with enlarged bases, which may be single bulb or multi bulbs. Such piles are suitable for resisting considerable soil movement of filed up ground, soft clay, and loose sand and have the advantages of increasing the soil strength and decreasing the displacement. In the present study, the finite element method was used to analyse the performance of a single pile with under-reamed bulbs of different shapes, that is, single cone, double cone, and half and full sphere, embedded in homogeneous, poorly graded sandy soil. The model of under-reamed pile was made of reinforced concrete and the bulb located at the middle of the embedded length of the pile. The dynami
This paper presents an experimental study between uniform pile and different types of under-reamed pile, single bulb. The under-reamed piles are piles with enlarged bases that are suitable to resist considerable movement of the ground, filed up ground, soft clay, and loose sand which have advantages to increase the soil strength, uplift capacity, and decrease the displacement. In the present study, there are experimental analyze to performance the suitable under-reamed type under sinusoidal load from vertical vibration (motor-oscillator was mounted directly on the pile cap. The main finding of this work is that the pile capacity increases with the ream and that all stress values of so
A three species food web model involving a stage structure and cannibalism in the top predator species is proposed and studied. It is assumed that the prey species growth logistically in the absence of predator and the predation process occurred according to theLotka-Volterra functional response. The existence, uniqueness and bounded-ness of the solution of the model are investigated. The local and global stability conditions of all possible equilibrium points are established.The persistence conditions of the model are also determined. The local bifurcation near each of the equilibrium points is analyzed. The global dynamics of the model is investigated numerically and compared with the obtained analytical results. It is observed that the p
... Show MoreRecommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreIncremental sheet forming (ISF) is a metal forming technology in which small incremental deformations determine the final shape. The sheet is deformed by a hemispherical tool that follows the required shape contour to deform the sheet into the desired geometry. In this study, single point incremental sheet forming (SPIF) has been implemented in dentistry to manufacture a denture plate using two types of stainless steel, 304 and 316L, with an initial thickness of 0.5mm and 0.8mm, respectively. Stainless steel was selected due to its biocompatibility and reasonable cost. A three-dimensional (3D) analysis procedure was conducted to evaluate the manufactured part's geometrical accuracy and thickness distribution. The obtained results confirm
... Show MoreThis study is about awareness of teaching explanation difficulties in the Islamic university from the lecturers point of view. It discussed the difficulties and the traditional teaching methods of explanation. The study concentrated on teaching Islamic studies in general and teaching explanation in specific and set difficulties so as to be treated.
The study is of three chapters, the first contains the difficulties in several aspects like the educational goals, text contents, teaching methods and styles, students, educational techniques, educational aids and evaluation, it addition to the lecturers of Islamic university colleges in 2009-2
... Show MoreThe research aims to study the administrative problems in the sports management of the members of the administrative bodies of the first-class clubs of the province of Baghdad in football. The researchers used the descriptive approach (survey study) for its relevance to the nature of the research. The research community is represented by first-class football players, who numbered (176) players. The research sample was chosen by the deliberate method, as the basic research sample reached (136) individuals from the total research community. The researchers used the questionnaire to collect the necessary data to achieve the goal of the research by applying a questionnaire that aims to ident
... Show More