Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sharing and the generating random positions of hiding. This method has been in hiding a text file and recovered without loss of information, as well as not noticing any deformation of the image. Where it was hiding a text file size of 20 KB in image cover (250x250) pixels, the result of MSE is 0.696 and PSNR is 49.211.
Numeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a
... Show MoreNovel artificial neural network (ANN) model was constructed for calibration of a multivariate model for simultaneously quantitative analysis of the quaternary mixture composed of carbamazepine, carvedilol, diazepam, and furosemide. An eighty-four mixing formula where prepared and analyzed spectrophotometrically. Each analyte was formulated in six samples at different concentrations thus twentyfour samples for the four analytes were tested. A neural network of 10 hidden neurons was capable to fit data 100%. The suggested model can be applied for the quantitative chemical analysis for the proposed quaternary mixture.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreECG is an important tool for the primary diagnosis of heart diseases, which shows the electrophysiology of the heart. In our method, a single maternal abdominal ECG signal is taken as an input signal and the maternal P-QRS-T complexes of original signal is averaged and repeated and taken as a reference signal. LMS and RLS adaptive filters algorithms are applied. The results showed that the fetal ECGs have been successfully detected. The accuracy of Daisy database was up to 84% of LMS and 88% of RLS while PhysioNet was up to 98% and 96% for LMS and RLS respectively.
This study aim to identify the concept of web based information systems since its one of the important topics that is usually omitted by our organizations, in addition to, designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.
This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat
... Show MoreIn this study the role of remote sensing and geographic information systems in the planning of some Iraqi cities, including the city of Aziziyah in Kut / Wasit Governorate, was considered. Certain appropriate models (sprawling growth patterns) have been adopted to plan this city, and tables and a future map have been prepared to arrange this city. Land uses for public services will be proposed for adopted case(Aziziyah in Kut / Wasit Governorate). This paper describes a specific application of GIS functionalities for spatial planning analysis, examines the breadth of GIS and attempts to address the analytical part’s limitations in planning studies. The study concluded, through high-resolution visuals, to the possibility of determining th
... Show MoreRoughness length is one of the key variables in micrometeorological studies and environmental studies in regards to describing development of cities and urban environments. By utilizing the three dimensions ultrasonic anemometer installed at Mustansiriyah university, we determined the rate of the height of the rough elements (trees, buildings and bridges) to the surrounding area of the university for a radius of 1 km. After this, we calculated the zero-plane displacement length of eight sections and calculated the length of surface roughness. The results proved that the ranges of the variables above are ZH (9.2-13.8) m, Zd (4.3-8.1) m and Zo (0.24-0.48) m.