Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates the algorithm performance for concealing different types of secret media, such as MS office file formats, image files, PDF files, executable files, and compressed files.
The theater has a living environment that resembles or realistically simulates the real life environment on the stage where we see the place, light and living being as elements representing a picture of the life scene and for a period of time the theater merely conveyed that image, but with the development of the world industrially and technologically, the perception of this picture has evolved with the emergence of intellectual progress where each part has advantages and Philosophical goals that are consistent with the evolution of form. The theatrical lighting, colors and landscapes have become parts in the composition of a new life component in form and content and based on the above this research is titled&nbs
... Show MoreThe reinforced fiberglass in cement slurry reflects the effect on its properties compared to usual additives. Fiberglass is typically used in cement slurry design for one or another of the following goals: (Earth earthquake, bearing storage, and with differential stresses, to enhance cement durability and increase its compressive strength). The main goal is to use glass fiber and ground fiberglass to improve the tensile strength and moderate compressive strength significantly. On the other hand, the use of glass fibers led to a slight increase in the value of thickening time, which is a desirable effect. Eleven glass fiber samples and milled glass fiber were used to show these materials' effect on Iraqi cement with (0.125, 0.25, 0.5
... Show MoreThis contribution provides an atomistic understanding into the impact of W, Nb, and Mo co-substitution at Hf-site of cubic HfO2 lattice to produce Hf1−xTMxO2 system at x = 25%. The calculations have been performed under the framework of density functional theory supported by Habbured parameter (DFT+U). Structural analysis demonstrates that the recorded lattice constants is in good coherence with the previously published results. For the lattice parameters, contraction by 1.33% comparing with the host system has been reported. Furthermore, the doping effect of TM on the band gap leads to its reduction in the resulting Hf0.75TM0.25O2 configurations. The partial density of states (PDOS) indicate that hybridization through localized electroni
... Show MoreAbsence or hypoplasia of the internal carotid artery (ICA) is a rare congenital anomaly that is mostly unilateral and highly associated with other intracranial vascular anomalies, of which saccular aneurysm is the most common. Blood flow to the circulation of the affected side is maintained by collateral pathways, some of which include the anterior communicating artery (Acom) as part of their anatomy. Therefore, temporary clipping during microsurgery on Acom aneurysms in patients with unilateral ICA anomalies could jeopardize these collaterals and place the patient at risk of ischemic damage. In this paper, we review the literature on cases with a unilaterally absent ICA associa
The current research aims to find out (the effectiveness of teaching TRIZ theory in the expressive performance and the development of creative thinking among preparatory school students)
To achieve this, the researcher adopted on an experimental design is located in women with partial seizure experimental designs field in order to achieve the goals of the research, has sample consisted of two divisions seminars Mentzmtin in junior high school Diyala for Boys, and divided the sample of (60) called on the two groups, the first pilot of ( 30) student, and the other officer and number (30), student, and studied researchers experimental group theory TRIZ, while he studied the officer in the traditional manner, the researcher conducted a pa
In this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained
Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show MoreFeatures is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris corner detection is rotation invariant but it isn’t scale invariant. This paper presents an efficient harris corner detector invariant to scale, this improvement done by using gaussian function with different scales. The experimental results illustrate that it is very useful to use Gaussian linear equation to deal with harris weakness.
In this paper, the speed control of the real DC motor is experimentally investigated using nonlinear PID neural network controller. As a simple and fast tuning algorithm, two optimization techniques are used; trial and error method and particle swarm optimization PSO algorithm in order to tune the nonlinear PID neural controller's parameters and to find best speed response of the DC motor. To save time in the real system, a Matlab simulation package is used to carry out these algorithms to tune and find the best values of the nonlinear PID parameters. Then these parameters are used in the designed real time nonlinear PID controller system based on LabVIEW package. Simulation and experimental results are compared with each other and showe
... Show More