Primary objective of the proposed system is to achieve higher level of confidentiality in absence of standard encryption techniques which add up to complexity of the stego system. In this system the principle of dominoes is adopted in the way of the selection of the pixel of the image to hide the ciphertext. Where domino stones models are prepared in advance, which are two-dimensional matrices (2*6), and selecting one of them and start the projection of the model on the image and hide the ciphertext in the pixel corresponding to the points in the domino model Experimental results show that the proposed system effectively achieve the objective. Even though the proposed system gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image can be seen by the human vision system (HVS), so this method can be considered as a success and can be adopted in the field of stege
Pore pressure means the pressure of the fluid filling the pore space of formations. When pore pressure is higher than hydrostatic pressure, it is named abnormal pore pressure or overpressure. When abnormal pressure occurred leads to many severe problems such as well kick, blowout during the drilling, then, prediction of this pressure is crucially essential to reduce cost and to avoid drilling problems that happened during drilling when this pressure occurred. The purpose of this paper is the determination of pore pressure in all layers, including the three formations (Yamama, Suliay, and Gotnia) in a deep exploration oil well in West Qurna field specifically well no. WQ-15 in the south of Iraq. In this study, a new appro
... Show MoreThis study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m
... Show MoreThe symmetrical N,N‾-Bis-(4-methyl phenyl) pyromellitamic diacid (I) was synthesized from the reaction of toludine with pyromellitic dianhydride in dry acetone. Esterification of amic acid (I) with dimethyl sulphate in basic medium using acetone as a solvent give symmetrical N,N‾-bis-( 4- methyl phenyl ) pyromellitam diacetate (II). The condensation of new ester with hydrazine hydrate in ethanol leads to the formation symmetrical N,N‾-bis- (4-methyl phenyl) pyromellitamic hydrazide (III). New symmetrical 1,3-oxazepine derivatives (V)a-e can be synthesized from the reaction of the new synthesized Schiff bases (III)a-e (which are synthesized from the reaction new hydrazide
... Show More5-Fluorouracil is one of the commonly used chemotherapy drugs in anticancer therapy; unfortunately treatment with 5-FU by solely has many drawbacks low lipophilicity, low permeability, low molecular weight, and its relatively poor plasma protein binding; also a brief half-life therefore frequent administration is required to maintain the optimal therapeutic plasma level which in addition to its poor selectivity, drug resistance and limited penetration to cancer cells; leads to increased incidence of side-effects to healthy cells/tissues and low response rates. In order to minimize these drawbacks; 5-FU was chemically conjugated with pyrrolidine dithiocarbamate (PDTC) in a mutual prodrug moiety (S-(9H-purin-6-yl) 3-(
... Show MoreBackground: Native chest Computed Tomography (CT) is a quick, non-invasive and practical investigation & plays an important role in evaluation of Coronavirus Disease 2019.
Objective: to describe the chest CT findings in patients with confirmed coronavirus disease 2019 (COVID-19) in sample from Baghdad population.
Patients & methods: Study sample consisted of 55 patients with laboratory confirmed COVID-19 from 1st March through 15th April 2020. Native chest CT was performed in radiology departments in Medical City Teaching Complex (MCTH). The chest CT images were reviewed & analyzed.
Results: The most frequent CT findings were ground-glass opacities (47.3%) & mixed ground glass
... Show MoreThis paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ
... Show MoreThe reliability of hybrid systems is important in modern technology, specifically in engineering and industrial fields; it is an indicator of the machine's efficiency and ability to operate without interruption for an extended period of time. It also allows for the evaluation of machines and equipment for planning and future development. This study looked at reliability of hybrid (parallel series) systems with asymmetric components using exponential and Pareto distributions. Several simulation experiments were performed to estimate the reliability function of these systems using the Maximum Likelihood method and the Standard Bayes method with a quadratic loss (QL) function and two priors: non-informative (Jeffery) and inform
... Show MoreResearchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa
... Show More