The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreOrganic Permeable Base Transistors (OPBTs) reach a very high transit frequency and large on-state currents. However, for a later commercial application of this technology, a high operational stability is essential as well. Here, the stability of OPBTs during continuous cycling and during base bias stress is discussed. It is observed that the threshold voltage of these transistors shifts toward more positive base voltages if stressed by applying a constant potential to the base electrode for prolonged times. With the help of a 2D device simulation, it is proposed that the observed instabilities are due to charges that are trapped on top of an oxide layer formed around the base electrode. These charges are thermally released after rem
... Show More
Early detection of eye diseases can forestall visual deficiency and vision loss. There are several types of human eye diseases, for example, diabetic retinopathy, glaucoma, arteriosclerosis, and hypertension. Diabetic retinopathy (DR) which is brought about by diabetes causes the retinal vessels harmed and blood leakage in the retina. Retinal blood vessels have a huge job in the detection and treatment of different retinal diseases. Thus, retinal vasculature extraction is significant to help experts for the finding and treatment of systematic diseases. Accordingly, early detection and consequent treatment are fundamental for influenced patients to protect their vision. The aim of this paper is to detect blood vessels from
... Show MoreInformation processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (
... Show MoreRecommendation systems are now being used to address the problem of excess information in several sectors such as entertainment, social networking, and e-commerce. Although conventional methods to recommendation systems have achieved significant success in providing item suggestions, they still face many challenges, including the cold start problem and data sparsity. Numerous recommendation models have been created in order to address these difficulties. Nevertheless, including user or item-specific information has the potential to enhance the performance of recommendations. The ConvFM model is a novel convolutional neural network architecture that combines the capabilities of deep learning for feature extraction with the effectiveness o
... Show MoreBackground: The ultimate purpose of this prospective study is to estimate and measure swelling associated with surgical extrac¬tion of impacted mandibular third molars in different four post-operative times and to identify the risk factors associated with determination of their risk degree. Material and Methods: In this prospective cohort study 159 consecutive cases in which removal of impacted lower third molars in 107outpatients were evaluated. Five groups of variables have been studied which are regarded as a potential factor for swelling after mandibular third removal which will enable the surgeon to predict and counsel high risk patients in order to offer a preventive strategy. Results: Facial measurements were carried out on 1st, 2
... Show MoreBackground: Biologic mechanisms of the form-function interaction are one of important component of orthodontic diagnosis. The purpose of this study is to search for the statistical associations between natural postural and craniofacial morphologic variables of the head. Materials and methods: The sample comprised natural head posture (NHP) cephalograms of 90 subjects, aged 18 to 25 years. Interpretation of the facial structure was made by using both intracranial and the extra-cranial reference lines in AutoCAD computer program. Results The measures of anteroposterior maxillary position, SNA showed a low negative correlations with the anterior cranial base angulation to true vertical (SN.Ver) and with the cranio-cervical position of the head
... Show MoreA new computer-generated optical element called a monochrome image hologram (MIH) is described. A real nonnegative function to represent the transmittance of a synthesized hologram is used. This technique uses the positions of the samples in the synthesized hologram to record the phase information of a complex wavefront. Synthesized hologram is displayed on laser printer and is recorded on a film. Finally the reconstruction process is done using computerized .
Medical image security is possible using digital watermarking techniques. Important information is included in a host medical image in order to provide integrity, consistency, and authentication in the healthcare information system. This paper introduces a proposed method for embedding invisible watermarking in the 3D medical image. The cover medical image used is DICOM which consists of a number of slices, each one representing a sense, firstly must separate the ROI (Region of Interest) and NROI (Not Region Of Interest) for each slice, the separation process performed by the particular person who selected by hand the ROI. The embedding process is based on a key generated from Arnold's chaotic map used as the position of a pixel in
... Show MoreHome New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr
... Show More