Primary objective of the proposed system is to achieve higher level of confidentiality in absence of standard encryption techniques which add up to complexity of the stego system. In this system the principle of dominoes is adopted in the way of the selection of the pixel of the image to hide the ciphertext. Where domino stones models are prepared in advance, which are two-dimensional matrices (2*6), and selecting one of them and start the projection of the model on the image and hide the ciphertext in the pixel corresponding to the points in the domino model Experimental results show that the proposed system effectively achieve the objective. Even though the proposed system gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image can be seen by the human vision system (HVS), so this method can be considered as a success and can be adopted in the field of stege
This study was carried out in order to determine the toxic, mutagenic and antimutagenic effects for Mallow (Malva parviflora) in comparison to its mutagenic effect of Ultraviolet (UV) because it is consider physical mutagen by using parameters for the extract pri , with , post UV exposure by using bacterial system (G-system). The used system consisted of three isolates G3 Bacillus spp., G12 Arthrobacter spp. and G27 Brevibacterium spp.. The study depended on recording survival fraction (Sx) for studying the effects and induction of Streptomycin and Refampicin resistance mutants as a genetic markers.Water Extract was prepared from fresh and dry mallow leaves, stems, flowers and roots, in optimum concentration equal to (125µg/ml) which is
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MoreThis research has come out with that, function-based responsibility accounting system has harmful side – effects preventing it of achieving its controlling objective, that is, goal congruence, which are due to its un integrated measures, its focus on measuring measurable behaviors while neglecting behaviors that are hardly measured, and its dependence on standard operating procedures.
In addition, the system hypotheses and measures are designed to fit previous business environment, not the current environment.
The research has also concluded that the suggestive model, that is, activity-based responsibility accounting is designed to get ride of harmful side – effects of functi
... Show MoreA low-cost reverse flow plasma system powered by argon gas pumping was built using homemade materials in this paper. The length of the resulting arc change was directly proportional to the flow rate, while using the thermal camera to examine the thermal intensity distribution and demonstrating that it is concentrated in the centre, away from the walls at various flow rates, the resulting arc's spectra were also measured. The results show that as the gas flow rate increased, so did the ambient temperature. The results show that the medium containing the arc has a maximum temperature of 34.1 ˚C at a flow rate of 14 L/min and a minimum temperature of 22.6 ˚C at a flow rate of 6 L/min.
In the present study, MCM-41 was synthesis as a carrier for poorly drugs soluble in water, by the sol-gel technique. Textural and chemical characterizations of MCM-41 were carried out by X-ray diffraction (XRD), Fourier transform infrared (FTIR), scanning electron microscope (SEM), and thermal gravimetric analysis (TGA). The experimental results were analyzed mesoporous carriers MCM-41. With maximum drug loading efficiency in MCM-41 determined to be 90.74%. The NYS released was prudently studied in simulated body fluid (SBF) pH 7.4 and the results proved that the release of NYS from MCM-41 was (87.79%) after 18 hr. The data of NYS released was found to be submitted a Weibull model with a correlation coefficient of (0.995). The Historical
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show Moresensor sampling rate (SSR) may be an effective and crucial field in networked control systems. Changing sensor sampling period after designing the networked control system is a critical matter for the stability of the system. In this article, a wireless networked control system with multi-rate sensor sampling is proposed to control the temperature of a multi-zone greenhouse. Here, a behavior based Mamdany fuzzy system is used in three approaches, first is to design the fuzzy temperature controller, second is to design a fuzzy gain selector and third is to design a fuzzy error handler. The main approach of the control system design is to control the input gain of the fuzzy temperature controller depending on the cur
... Show MoreIn this work, seven soil samples were brought brought to study and analyses the element concentrations from different southern regions of Iraq using laser-induced breakdown spectroscopy (LIBS) technique. It has been documented as an atomic emission spectroscopy (AES) technique. Laser-induced plasma utilized to analyze elements in materials (gases, liquids, and solids). In order to analyze elements in materials (gases, liquids, and solid). The Nd: YAG laser excitation source at 1064 nm with pulse width 9 ns is used to generate power density of 5.5 x 1012 MW/mm2, with optical spectrum in the range 320-740 nm. From this investigation, the soil sample analysis of the southern cities of Iraqi, it is concluded that the rich soil element of P, Si,
... Show MoreIn this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show More