Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates the algorithm performance for concealing different types of secret media, such as MS office file formats, image files, PDF files, executable files, and compressed files.
Reservoir study has been developed in order to get a full interesting of the Nahr Umr formation in Ratawi oil field. Oil in place has been calculated for Nahr Umr which was 2981.37 MM BBL. Several runs have been performed to get matching between measured and calculated of oil production data and well test pressure. In order to get the optimum performance of Nahr Umr many strategies have been proposed in this study where vertical and horizontal wells were involved in addition to different production rates. The reservoir was first assumed to be developed with vertical wells only using production rate of (80000–125000) STB/day. The reservoir is also proposed to produce using horizontal wells besides vertical wells with production rat
... Show MoreA cantilevered piezoelectric beam with a tip mass at its free end is a common energy harvester configuration. This paper introduces a new principle of designing such a harvester which increases the generated voltage without changing the natural frequency of the harvester: The attraction force between two permanent magnets is used to add stiffness to the system. This magnetic stiffening counters the effect of the tip mass on the natural frequency. Three setups incorporating piezoelectric bimorph cantilevers of the same type in different mechanical configurations are compared theoretically and experimentally to investigate the feasibility of this principle. Theoretical and experimental results show that magnetically stiffe
... Show MoreThis research aimed at studying the role of calculated knowledge an its efficiency in improving the performance especially most of the organizations are living within knowledge era which concentrate on new technology investment in different fields of modern live . Under the scientific trends towards the economy of calculated knowledge which depend basically on new computer program in order to utilize the knowledge to raise the level of work performance exploiting different resources in the best way that helps the organizations to achieve their objectives because the information technology and computer programs became a means of survival and indispensible instrument within the developed world which depend on prosperity . progress
... Show MoreCadmium sulfide photodetector was fabricated. The CdS nano
powder has been prepared by a chemical method and deposited as a
thin film on both silicon and porous p- type silicon substrates by spin
coating technique. Structural, morphological, optical and electrical
properties of the prepared CdS nano powder are studied. The X-ray
analysis shows that the obtained powder is CdS with predominantly
hexagonal phase. The Hall measurements show that the nano powder
is n-type with carrier concentration of about (-5.4×1010) cm-3. The
response time of fabricated detector was measured by illuminating
the sample with visible radiation and its value was 5.25 msec. The
specific detectivity of the fabricated det
This research aims to the possibility of evaluating the strategic performance of the State Board for Antiquities and Heritage (SBAH) using a balanced scorecard of four criteria (Financial, Customers, Internal Processes, and Learning and Growth). The main challenge was that the State Board use traditional evaluation in measuring employee performance, activities, and projects. Case study and field interviews methodology has been adopted in this research with a sample consisting of the Chairman of the State Board, 6 General Managers, and 7 Department Managers who are involved in evaluating the strategic performance and deciding the suitable answers on the checklists to analyze it according to the 7-points Likert scale. Data analysis re
... Show MoreThis research aims to the possibility of evaluating the strategic performance of the State Board for Antiquities and Heritage (SBAH) using a balanced scorecard of four criteria (Financial, Customers, Internal Processes, and Learning and Growth). The main challenge was that the State Board use traditional evaluation in measuring employee performance, activities, and projects. Case study and field interviews methodology has been adopted in this research with a sample consisting of the Chairman of the State Board, 6 General Managers, and 7 Department Managers who are involved in evaluating the strategic performance and deciding the suitable answers on the checklists to analyze it ac
... Show MoreA new computer-generated optical element called a monochrome image hologram (MIH) is described. A real nonnegative function to represent the transmittance of a synthesized hologram is used. This technique uses the positions of the samples in the synthesized hologram to record the phase information of a complex wavefront. Synthesized hologram is displayed on laser printer and is recorded on a film. Finally the reconstruction process is done using computerized .
Medical image security is possible using digital watermarking techniques. Important information is included in a host medical image in order to provide integrity, consistency, and authentication in the healthcare information system. This paper introduces a proposed method for embedding invisible watermarking in the 3D medical image. The cover medical image used is DICOM which consists of a number of slices, each one representing a sense, firstly must separate the ROI (Region of Interest) and NROI (Not Region Of Interest) for each slice, the separation process performed by the particular person who selected by hand the ROI. The embedding process is based on a key generated from Arnold's chaotic map used as the position of a pixel in
... Show More