The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embedding of several stages of complexity. Also, LSB method via using the whole image is to increase the security and robustness of the proposed method as compared to state-of the-art methods.
The calculation of the oil density is more complex due to a wide range of pressuresand temperatures, which are always determined by specific conditions, pressure andtemperature. Therefore, the calculations that depend on oil components are moreaccurate and easier in finding such kind of requirements. The analyses of twenty liveoil samples are utilized. The three parameters Peng Robinson equation of state istuned to get match between measured and calculated oil viscosity. The Lohrenz-Bray-Clark (LBC) viscosity calculation technique is adopted to calculate the viscosity of oilfrom the given composition, pressure and temperature for 20 samples. The tunedequation of state is used to generate oil viscosity values for a range of temperatu
... Show MoreMB Mahmood, BN Dhannoon
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreA simple and highly sensitive cloud point extraction process was suggested for preconcentration of micrograms amount of isoxsuprine hydrochloride (ISX) in pure and pharmaceutical samples. After diazotization coupling of ISX with diazotized sulfadimidine in alkaline medium, the azo-dye product quantitatively extracted into the Triton X-114 rich phase, dissolved in ethanol and determined spectrophotometrically at 490 nm. The suggested reaction was studied with and without extraction and simple comparison between the batch and CPE methods was achieved. Analytical variables including concentrations of reagent, Triton X-114 and base, incubated temperature, and time were carefully studied. Under the selected optimum conditions,
... Show MoreIn this research, carbon nanotubes (CNTs) is prepared through the Hummers method with a slight change in some of the work steps, thus, a new method has been created for preparing carbon nanotubes which is similar to the original Hummers method that is used to prepare graphene oxide. Then, the suspension carbon nanotubes is transferred to a simple electrode position platform consisting of two electrodes and the cell body for the coating and reduction of the carbon nanotubes on ITO glass which represents the cathode electrode while platinum represents the anode electrode. The deposited layer of carbon nanotubes is examined through the scanning electron microscope technique (SEM), and the images throughout the research show the
... Show MoreA simple and highly sensitive cloud point extraction process was suggested for preconcentration of micrograms amount of isoxsuprine hydrochloride (ISX) in pure and pharmaceutical samples. After diazotization coupling of ISX with diazotized sulfadimidine in alkaline medium, the azo-dye product quantitatively extracted into the Triton X-114 rich phase, dissolved in ethanol and determined spectrophotometrically at 490 nm. The suggested reaction was studied with and without extraction and simple comparison between the batch and CPE methods was achieved. Analytical variables including concentrations of reagent, Triton X-114 and base, incubated temperature, and time were carefully studied. Under the selected opti
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe development of information systems in recent years has contributed to various methods of gathering information to evaluate IS performance. The most common approach used to collect information is called the survey system. This method, however, suffers one major drawback. The decision makers consume considerable time to transform data from survey sheets to analytical programs. As such, this paper proposes a method called ‘survey algorithm based on R programming language’ or SABR, for data transformation from the survey sheets inside R environments by treating the arrangement of data as a relational format. R and Relational data format provide excellent opportunity to manage and analyse the accumulated data. Moreover, a survey syste
... Show MoreShadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.
There is no doubt that the project control function is very important for administration, so the project Management depends on to monitor and control the project. The project control integrated to the planning which is the base of the administration functions; planning, organizing, directing, and controlling. Without project control cannot be insure to fulfill the plan of the project by the budget and specified time. The project management apply many methods of control to achieve the goals of project which are cost, time, and required specifications. Earned Value Management one of control methods that used in the project by international companies.
Earned Value Method is used in the project o
... Show More