DNA computing widely used in encryption or hiding the data. Many researchers have proposed many developments of encryption and hiding algorithms based on DNA sequence to provide new algorithms. In this paper data hiding using integer lifting wavelet transform based on DNA computing is presented. The transform is applied on blue channel of the cover image. The DNA encoding used to encode the two most significant bits of LL sub-band. The produced DNA sequence used for two purpose, firstly, it use to construct the key for encryption the secret data and secondly to select the pixels in HL, LH, HH sub-bands for hiding in them. Many measurement parameters used to evaluate the performance of the proposed method such PSNR, MSE, and SSIM. The experimental results show high performance with respect to different embedding rate.
Hartha Formation is an overburdened horizon in the X-oilfield which generates a lot of Non-Productive Time (NPT) associated with drilling mud losses. This study has been conducted to investigate the loss events in this formation as well as to provide geological interpretations based on datasets from nine wells in this field of interest. The interpretation was based on different analyses including wireline logs, cuttings descriptions, image logs, and analog data. Seismic and coherency data were also used to formulate the geological interpretations and calibrate that with the loss events of the Hartha Fm.
The results revealed that the upper part of the Hartha Fm. was identified as an interval capable of creating potentia
... Show MoreThe purpose of this paper is to model and forecast the white oil during the period (2012-2019) using volatility GARCH-class. After showing that squared returns of white oil have a significant long memory in the volatility, the return series based on fractional GARCH models are estimated and forecasted for the mean and volatility by quasi maximum likelihood QML as a traditional method. While the competition includes machine learning approaches using Support Vector Regression (SVR). Results showed that the best appropriate model among many other models to forecast the volatility, depending on the lowest value of Akaike information criterion and Schwartz information criterion, also the parameters must be significant. In addition, the residuals
... Show MoreTourism plays an important role in Malaysia’s economic development as it can boost business opportunity in its surrounding economic. By apply data mining on tourism data for predicting the area of business opportunity is a good choice. Data mining is the process that takes data as input and produces outputs knowledge. Due to the population of travelling in Asia country has increased in these few years. Many entrepreneurs start their owns business but there are some problems such as wrongly invest in the business fields and bad services quality which affected their business income. The objective of this paper is to use data mining technology to meet the business needs and customer needs of tourism enterprises and find the most effective
... Show MoreCharacterization of the heterogonous reservoir is complex representation and evaluation of petrophysical properties and application of the relationships between porosity-permeability within the framework of hydraulic flow units is used to estimate permeability in un-cored wells. Techniques of flow unit or hydraulic flow unit (HFU) divided the reservoir into zones laterally and vertically which can be managed and control fluid flow within flow unit and considerably is entirely different with other flow units through reservoir. Each flow unit can be distinguished by applying the relationships of flow zone indicator (FZI) method. Supporting the relationship between porosity and permeability by using flow zone indictor is ca
... Show MoreOnline service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
The accurate extracting, studying, and analyzing of drainage basin morphometric aspects is important for the accurate determination of environmental factors that formed them, such as climate, tectonic activity, region lithology, and land covering vegetation.
This work was divided into three stages; the 1st stage was delineation of the Al-Abiadh basin borders using a new approach that depends on three-dimensional modeling of the studied region and a drainage network pattern extraction using (Shuttle Radar Topographic Mission) data, the 2nd was the classification of the Al-Abiadh basin streams according to their shape and widenings, and the 3rd was ex
... Show MoreThe study aimed to analyze the effect of meteorological factors (rainfall rate and temperature) on the change in land use in the marshes of the Al‐Majar Al‐Kabir region in southern Iraq. Satellite images from Landsat 7 for 2012 and Landsat 8 for 2022 were used to monitor changes in the land coverings, the images taken from the Enhanced Thematic Mapper Plus (ETM+) and Operational Land Imager (OLI) sensors of the Landsat satellite. Geometric correction was used to convert images into a format with precise geographic coordinates using ArcMap 10.5. The maximum likelihood classification method was used to examine satellite image data using a supervised approach, and the data were analyzed statistically. We obtained clear images of the area,
... Show More