In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a cover that is digital color image for hiding a text in that selected cover for testing a proposed method of generating the private key. The hiding algorithm used is least significant bit (LSB). Finally, the generated key is tested by hiding process and changing the extension of image, after that notice the generated key is not changed or modified. the Matlap language is used to design and implement a proposed method.
The estimation of the regular regression model requires several assumptions to be satisfied such as "linearity". One problem occurs by partitioning the regression curve into two (or more) parts and then joining them by threshold point(s). This situation is regarded as a linearity violation of regression. Therefore, the multiphase regression model is received increasing attention as an alternative approach which describes the changing of the behavior of the phenomenon through threshold point estimation. Maximum likelihood estimator "MLE" has been used in both model and threshold point estimations. However, MLE is not resistant against violations such as outliers' existence or in case of the heavy-tailed error distribution. The main goal of t
... Show MoreThis research aims to choose the appropriate probability distribution to the reliability analysis for an item through collected data for operating and stoppage time of the case study.
Appropriate choice for .probability distribution is when the data look to be on or close the form fitting line for probability plot and test the data for goodness of fit .
Minitab’s 17 software was used for this purpose after arranging collected data and setting it in the the program.
&nb
... Show More
The aim of this research is to identify the Andalusia poet Abu Izac Al-Zauali , whose most of his poetry and biography had been lost, as well as many Andalusia poets. So this research is hoped to be the first step to shed the light on the poet’s life and poetry and to document his poetry as other writers do. It is also hoped that this research would pave the way , God willing , to the steps of finding more references about this poet .
Key Words: (Al-Zauali, Cordoba, Al-Ruaini choices, Andalusia Poetry , Almuahdi Era).
Abstract: This article is a comparative analysis of the concept and types of homonyms in Russian and Arabic. Homonyms are lexical units that have the same sound but different meanings. The study of homonymy in different languages can help reveal the features of the semantic structure and syntactic rules of each language. The article discusses the main aspects of homonymy in Russian and Arabic, as well as a comparative analysis of the types of homonyms that exist in both languages. The study includes an analysis of the semantic meanings of homonyms, their use in context, and possible differences in syntactic features that may affect their interpretation and perception by native speakers of these languages. The purpose of the article is to id
... Show MoreThe preferred route of drug administration is the oral route, but drugs with narrow absorption window in the gastrointestinal tract are still challenging. The ability to extend and monitor the gastric emptying time is a valuable tool for processes remaining in the stomach longer than other traditional dosage forms.
The purpose of this study was to formulate and evaluate gastroretentive superporous hydrogel (SPH) of carvedilol with view to improve its solubility and increase gastric residence time in order to get sustained release formulas via utilization of various kinds and concentrations of hydrophilic polymers then after, incorporate the best prepared formula into capsules.
Sixteenth formulae of SPH h
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThis study produces an image of theoretical and experimental case of high loading stumbling condition for hip prosthesis. Model had been studied namely Charnley. This model was modeled with finite element method by using ANSYS software, the effect of changing the design parameters (head diameter, neck length, neck ratio, stem length) on Charnley design, for stumbling case as impact load where the load reach to (8.7* body weight) for impact duration of 0.005sec.An experimental rig had been constructed to test the hip model, this rig consist of a wood box with a smooth sliding shaft where a load of 1 pound is dropped from three heights.
The strain produced by this impact is measured by using rosette strain gauge connected to Wheatstone
عملية تغيير حجم الصورة في مجال معالجة الصور باستخدام التحويلات الهندسية بدون تغيير دقة الصورة تعرف ب image scaling او image resizing. عملية تغيير حجم الصورة لها تطبيقات واسعة في مجال الحاسوب والهاتف النقال والاجهزة الالكترونية الاخرى. يقترح هذا البحث طريقة لتغيير حجم الصورة باستخدام المعادلات الخاصة بمنحني Bezier وكيفية الحصول على افضل نتائج. تم استخدام Bezier curve في اعمال سابقة في مجالات مختلفة ولكن في هذا البحث تم استخد
... Show MoreA Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated vi
... Show MoreThere is a great deal of systems dealing with image processing that are being used and developed on a daily basis. Those systems need the deployment of some basic operations such as detecting the Regions of Interest and matching those regions, in addition to the description of their properties. Those operations play a significant role in decision making which is necessary for the next operations depending on the assigned task. In order to accomplish those tasks, various algorithms have been introduced throughout years. One of the most popular algorithms is the Scale Invariant Feature Transform (SIFT). The efficiency of this algorithm is its performance in the process of detection and property description, and that is due to the fact that
... Show More