Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates the algorithm performance for concealing different types of secret media, such as MS office file formats, image files, PDF files, executable files, and compressed files.
Experiment Factorial conducted with two factor in field texture silt clay loam soil, the first factor were Two Rotavator plow which different in number of rotary blades on flanges, weight, width, made and type, the second factor were four speeds tractor 2.62, 5.10, 7.55, 9.23 km/hr to compare performance two Rotavator under depth 12 cm and knowledge slippage, distance between beat blades, practical productivity, disturbed soil volume, percentage of the soil clods which have diameter less than 5 cm under complete block design with three replications using Least Significant Design 0.05. Results showed Galucho Rotavator recorder the higher practical productivity 0>7089 ha/hr, disturbed soil volume 809.8 m3/hr, percentage of the soil clods 96.1
... Show MoreA field study aimed to improve administrative performance of the Heads of Departments in Wasit University in light of the administrative functions, a questionnaire constructed was c of 38 items, as have been applied during the academic year 2014/2015 to a group of experts from the deans and assistants, professors and heads of departments using the Delphi method by two rounds the adoption rate of 90% and an agreement was numbered 30 experts and study reached important results have been analyzed and discussed according to fields of study, a planning, organization and direction.
Fuzzy numbers are used in various fields such as fuzzy process methods, decision control theory, problems involving decision making, and systematic reasoning. Fuzzy systems, including fuzzy set theory. In this paper, pentagonal fuzzy variables (PFV) are used to formulate linear programming problems (LPP). Here, we will concentrate on an approach to addressing these issues that uses the simplex technique (SM). Linear programming problems (LPP) and linear programming problems (LPP) with pentagonal fuzzy numbers (PFN) are the two basic categories into which we divide these issues. The focus of this paper is to find the optimal solution (OS) for LPP with PFN on the objective function (OF) and right-hand side. New ranking f
... Show MoreCorona Virus Disease-2019 (COVID-19) is a novel virus belongs to the corona virus's family. It spreads very quickly and causes many deaths around the world. The early diagnosis of the disease can help in providing the proper therapy and saving the humans' life. However, it founded that the diagnosis of chest radiography can give an indicator of coronavirus. Thus, a Corner-based Weber Local Descriptor (CWLD) for COVID-19 diagnostics based on chest X-Ray image analysis is presented in this article. The histogram of Weber differential excitation and gradient orientation of the local regions surrounding points of interest are proposed to represent the patterns of the chest X-Ray image. Support Vector Machine (SVM) and Deep Belief Network (DBN)
... Show MoreTransient drop in the heart beat or transient heart block (AVB) may be consider the main cause of syncope or presyncope inpatients with bifascicular block and syncope According to the Guidelines for cardiac pacing pacemaker consider part of treatment. Aims of our study were to evaluate whether there is role for EPS in patients BFB and to evaluate the symptoms after pacing. 42 patients were enrolled in this study, with mean age value (63.4± 12.2years), suffer from interventricular conductive defect and syncope; patients underwent EPS on admission time, and pacemaker implantation accordingly and programmed follow up for the device in the last four years. Our patients were 25 (59.5%) male and 17 (40.5%)female, all of them with syncope o
... Show MoreCyclophosphamide is chemotherapeutic agent that utilized for the treatment of different malignancies; however its’ used associated with numerous adverse effects. Vitamin B2 and vitamin B12 suggested having myeloprotective effect. This work is designed to investigate the myeloprotective effect of both vitamins against cyclophosphamide induced myelosuppression. One hundred adult rats of both sexes were used in this study. The animals were randomly enrolled into ten groups of 10 rats each. Group I: Control group. Group II: Cyclophosphamide-treated. Group III and Group IV Orally-administered vitamin B2 (10, and 40 mg/kg/day), respectively alone for 7 days. Group V:
... Show MoreThe subject of improving the performance of services provided by government institutions of the important topics at the present time because of their direct contact at the service of citizens and the increased importance of these units as a result of the diversity of activities performed by the so governments of the countries and their people made sure to pay attention to the good use of those allocated to those sectors of resources and spending in the service prescribed and manage the highest level of efficiency and effectiveness and monitor the proper management of the money used in those sectors and evaluate their performance through the Supreme Audit Institutions so that they can play their role oversight and contribute to th
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show More