Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
RA Ali, LK Abood, Int J Sci Res, 2017 - Cited by 2
This study is a try to compare between the traditional Schwarzschild’s radius and the equation of Schwarzschild’s radius including the photon’s wavelength that is suggested by Kanarev for black holes to correct the error in the calculation of the gravitational radius where the wavelengths of the electromagnetic radiation will be in our calculation. By using the different wavelengths; from radio waves to gamma ray for arbitrary black holes (ordinary and supermassive).
This study aims to use claystone beds exposed in the Injana Formation (Late Miocene) at Karbala-Najaf plateau, middle of Iraq for the manufacturing of perforated and ordinary bricks. The claystone samples were assessed as an alternative material of the recent sediments, which are preferred to remain as agricultural land. The claystones are sandy mud composing of 29.1 - 39.1% clay, 37.2 - 54.8% silt and 14.1-26.8% sand. They consist of kaolinite, illite, chlorite, palygorskite, and montmorillonite with a lot of quartz, calcite, dolomite, gypsum and feldspar. Claystone samples were characterized by linear shrinkage 0.01 - 0.1%, volume shrinkage 0.1 - 0.9%, bulk density 1.2 - 2.11gm/cm3 (1.68 g / cm3 average), and the efflorescence is
... Show MoreA simple, precise, and sensitive spectrophotometric method has been established for the analysis of doxycycline. The method includes direct charge transfer complexation of doxycycline withp-Bromanil in acetonitrileto form a colored complex. The intensely colored product formed was quantified based on the absorption band at 377 nm under optimum condition. Beer’s law is obeyed in the concentration range of 1–50 μg.mL-1 with molar absorptivity of 1.5725x104 L.mol-1.cm-1, Sandell's sensitivity index (0.0283) μg.cm-2, detection limit of 0.1064 μg.mL-1, quantification limit 0.3224 μg.mL-1 and association constant of the formed complex (0.75x103). The developed method could find application in routine quality control of doxycycline and has
... Show MoreDrilling fluid properties and formulation play a fundamental role in drilling operations. The Classical water-based muds prepared from only the Syrian clay and water without any additives((Organic and industrial polymers) are generally poor in performance. Moreover, The high quantity of Syrian clay (120 gr / l) used in preparing drilling fluids. It leads to a decrease in the drilling speed and thus an increase in the time required to complete the drilling of the well. As a result, the total cost of drilling the well increased, as a result of an increase in the concentration of the solid part in the drilling fluid. In this context, our study focuses on the investigation of the improvement in drilling mud Prepa
... Show MoreThis paper demonstrates the construction designing analysis and control strategies for fully tracking concentrated solar thermal by using programmable logic control in the city of Erbil-Iraq. This work used the parabolic dish as a concentrated solar thermal. At the focal point, the collected form of energy is used for heating a (water) in the receiver, analyzing this prototype in real-time with two different shapes of the receiver and comparing the results. For tracking the parabolic dish, four light-dependent resistors are used to detect the sun's position in the sky so that the tracking system follows it to make the beam radiation perpendicular to the collector surface all of the time during the day for maximum solar p
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreWellbore instability and sand production onset modeling are very affected by Sonic Shear Wave Time (SSW). In any field, SSW is not available for all wells due to the high cost of measuring. Many authors developed empirical correlations using information from selected worldwide fields for SSW prediction. Recently, researchers have used different Artificial Intelligence methods for estimating SSW. Three existing empirical correlations of Carroll, Freund, and Brocher are used to estimate SSW in this paper, while a fourth new empirical correlation is established. For comparing with the empirical correlation results, another study's Artificial Neural Network (ANN) was used. The same data t
... Show More