This research deals with the use of a number of statistical methods, such as the kernel method, watershed, histogram and cubic spline, to improve the contrast of digital images. The results obtained according to the RSME and NCC standards have proven that the spline method is the most accurate in the results compared to other statistical methods
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreThis paper presents a 3D watermarking model based on the nearest distance between two vertices in mesh, where the embedding path moves as deep as possible until the embedding data is completed. The proposed algorithm achieved good results according to invisibility and robustness. The visibility was measured in term
of Root Mean Square Error (RMSE) and Hausdroff Distance (HD), which obtained good results. As related to robustness, the proposed method showed resistance to geometrical attack (translation, scaling and rotation) as well as acceptable resistance to signal processing attacks like noise addition and simplification.
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show More<p>In the mobile phone system, it is highly desirable to estimate the loss of the track not only to improve performance but also to achieve an accurate estimate of financial feasibility; the inaccurate estimate of track loss either leads to performance degradation or increased cost. Various models have been introduced to accurately estimate the path loss. One of these models is the Okomura / Hata model, which is recommended for estimating path loss in cellular systems that use micro cells. This system is suitable for use in a variety of environments. This study examines the comparison of path loss models for statistical analysis derived from experimental data collected in urban and suburban areas at frequencies of 150-1500 MHz
... Show MoreThis research aim to present theoretical and philosophical framework regards topic of intellectual capital readiness in Iraqi universities. That is, by using strategic map in balanced score card of Norton and Kaplan (2004). This research discusses theoretical content for three main aspects reflect in its nature elements of intellectual capital readiness in organizations. This includes human capital readiness, information capital readiness and organizational capital readiness. To clear each element, the authors relay on mechanism to determine gape per element of intellectual capital elements.
This study was conducted to determine the side effects of dexamethasone n some physiological and immunological criteria, which included, Measuring sugar level, liver (ALT, AST , LDH, Total protein) and kidney function (urea, createnine), total and differential count of W.B.C,CRP, TNF-α ,IL6,IL10. thirty rats were divided into two groups (15\ rat). G1: This group was considered negative control injection with normal saline, G2: This group was injected with 2 mg\kg dexamethasone. The results showed a significant increase in the level of enzymesALT, AST and sugar levels and decreased level of total protein in the group treated with the drug, also showed, a significant decrease in the total number of W.B.C an
... Show MoreThe childhood of the most important stages throughout the human and which have been more vulnerable to various factors surrounding it and with the scientific and cognitive development in all fields surfaced many psychological phenomena that play a large role in influencing children and their behavior trends is the susceptibility of the lure of psychological phenomena which plays a major role in the social attitudes of individuals it may not be predictable so that individuals vary in between them in terms of vulnerability Balasthoa You do this only _bl that the same individual at different influenced Balasthoa different depending on the positions and this was research to achieve its objectives and that are known:
_ alasthoa The childre
The traditional voice call over Global System for Mobile Communications (GSM) and Public Switched Telephone Network (PSTN) is expensive and does not provide a secure end to end voice transmission. However, the growth in telecommunication industry has offered a new way to transmit voice over public network such as internet in a cheap and more flexible way. Due to insecure nature of the public network, the voice call becomes vulnerable to attacks such as eavesdropping and call hijacking. Accordingly, protection of voice call from illegal listening becomes increasingly important.
To this end, an android-based application (named E2ESeVoice application) to transmit voice in a secure way between the end users is proposed based on modified R
Community peace is achieved in law-based states Constitutional institutions with competence and powers, and otherwise that peace is shaken and begins to collapse. The movement of individuals and groups in the State is regulated by law The law and its proper application without selectivity or exception, and then the sense of equal opportunity and equal rights grows every citizen looks at his spouse, what he has, and when he is unbalanced, a sense of frustration and stealing of rights is generated Societal peace suffers from the shocks of instability and what is reflected in the surrounding environment. Instead of production, demolition takes place, which impedes the achievement of the required peace.
... Show More