In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT decomposition via SVD coefficients extracted from DCT-transformed images in the midfrequency band. A content-aware strategy combining Gaussian blurring, Canny edge detection, and zigzag scanning is employed to increase robustness against image processing attacks. The experimental results demonstrate the effectiveness of the proposed approach, which achieves up to a 10.4% improvement in PSNR, an SSIM score of 0.996, and a 0.10% increase in NCC over those of previous methods, which mostly rely on grayscale images. These results reflect the ability of the system to maintain high visual quality while offering strong resilience and security for embedded data in full-color images.
To improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading
... Show MoreA simple, precise, and sensitive spectrophotometric method has been established for the analysis of doxycycline. The method includes direct charge transfer complexation of doxycycline withp-Bromanil in acetonitrileto form a colored complex. The intensely colored product formed was quantified based on the absorption band at 377 nm under optimum condition. Beer’s law is obeyed in the concentration range of 1–50 μg.mL-1 with molar absorptivity of 1.5725x104 L.mol-1.cm-1, Sandell's sensitivity index (0.0283) μg.cm-2, detection limit of 0.1064 μg.mL-1, quantification limit 0.3224 μg.mL-1 and association constant of the formed complex (0.75x103). The developed method could find application in routine quality control of doxycycline and has
... Show MoreReservoir characterization plays a crucial role in comprehending the distribution of formation properties and fluids within heterogeneous reservoirs. This knowledge is instrumental in constructing an accurate three-dimensional model of the reservoir, facilitating predictions regarding porosity, permeability, and fluid flow distribution. Among the various methods employed for reservoir characterization, the hydraulic flow unit stands out as a widely adopted approach. By effectively subdividing the reservoir into distinct zones, each characterized by unique petrophysical and geological properties, hydraulic flow units enable comprehensive reservoir analysis. The concept of the flow unit is closely tied to the flow zone indicator, a cr
... Show Morebackground: osteoporosis is a metabolic bone disease that affects women more than men, it is characterized by generalizes reduction of bone mineral density (BMD) leaving a fragile weak bone that is liable to fracture, gonial angle index (GAI) is one of the radio-morphometric indices, it has been controversial whether it is related to bone mineral density or ageing or none of them. The aim of study is to evaluate the role of cone beam computed tomography (CBCT) as a screening tool for diagnosis of osteoporosis and age effect in females using gonial angle index. Material and method: 60 females were divided into 3 groups according to age and (BMD) status into: Group1 (non-osteoporosis 20-30 years), Group2 (non-osteoporosis 50years and above),
... Show MoreThe aim of this research is to solve a real problem in the Department of Economy and Investment in the Martyrs establishment, which is the selection of the optimal project through specific criteria by experts in the same department using a combined mathematical model for the two methods of analytic hierarchy process and goal programming, where a mathematical model for goal programming was built that takes into consideration the priorities of the goal criteria by the decision-maker to reach the best solution that meets all the objectives, whose importance was determined by the hierarchical analysis process. The most important result of this research is the selection of the second pro
... Show MoreBackground: A review of articles of method in treating compound phalangeal fractures by using mini-external fixator, elaborating the anatomy, mechanics, modalities of treatment, and complications of these types of fractures. Also, it compares between different studies regarding the functional results and final outcome. External fixation of phalangeal fractures is a good method for osteo synthesis in certain situations. The simplicity of the surgical procedure and the minimal disruption of the normal bone architecture also make it appealing. Objectives: Evaluating the functional results of the use of mini-external fixator for the treatment of compound fractures of phalangeal bones of the hand. Method: Our study consists of 15 patients, 12 we
... Show MoreAd-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol depends on QoS using two types of applications (+ve and –ve QoS in the FIS evaluation). QoS of the protocol varies from one prot
... Show MoreThis paper demonstrates the construction designing analysis and control strategies for fully tracking concentrated solar thermal by using programmable logic control in the city of Erbil-Iraq. This work used the parabolic dish as a concentrated solar thermal. At the focal point, the collected form of energy is used for heating a (water) in the receiver, analyzing this prototype in real-time with two different shapes of the receiver and comparing the results. For tracking the parabolic dish, four light-dependent resistors are used to detect the sun's position in the sky so that the tracking system follows it to make the beam radiation perpendicular to the collector surface all of the time during the day for maximum solar p
... Show MoreAn agricultural waste (walnut shell) was undertaken to remove Cu(II) from aqueous solutions in batch and continuous fluidized bed processes. Walnut shell was found to be effective in batch reaching 75.55% at 20 and 200 rpm, when pH of the solution adjusted to 7. The equilibrium was achieved after 6 h of contacting time. The maximum uptake was 11.94mg/g. The isotherm models indicated that the highest determination coefficient belongs to Langmuir model. Cu (II) uptake process in kinetic rate model followed the pseudo-second-order with determination coefficient of 0.9972. More than 95% of the Cu(II) were adsorbed on the walnut shells within 6 h at optimum agitation speed of 800 rpm. The main functional groups responsible for biosorption of
... Show More