A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. The approach has been employed to use Fuzzy C-Mean clustering (FCM) to find the robust image regions for hiding the type of skin texture features in mice. The steganography was implemented using Least Significant Bit (LSB) method.
Some types of the fungus Aspergillus were isolated from some hospitals in the city of Baghdad (Imam Ali Hospital and Sadr General Hospital). The samples were taken by Transport media at a rate of three replicates of each place isolated from samples from different places within the hospital (waste, baths, the sick beds, corridors and room floors) for the purpose of isolating and diagnosing the fungus on the Czapeck Dox Agar media. It was noticed that the spread rate of fungus Aspergillus was 70% compared to other species that have emerged during the isolation process of the Sabouraud's Dextrose Agar media. The species A.niger (56.25%) was considered the most common type of fungus visible during the isolation process of the Imam Ali Hospit
... Show MoreThe present study investigated the impact of fuel kind on the emitted emissions at the idling period. Three types of available fuels in Iraq were tested. The tests conducted on ordinary gasoline with an octane number of 82, premium gasoline with an octane number of 92, and M20 (consist of 20% methanol and 80% regular gasoline). The 2 liters Mercedes-Benz engine was used in the experiments.
The results showed that engine operation at idle speed emits high levels of CO, CO2, HC, NOx and noise. The produced emission levels depend highly on fuel type. The premium gasoline (ON=92) represents the lower emissions level except for noise at all idling speed. Adding methanol to ordinary gasoline (ON=82) showed high levels of emi
... Show MoreAkaike’s Information Criterion (AIC) is a popular method for estimation the number of sources impinging on an array of sensors, which is a problem of great interest in several applications. The performance of AIC degrades under low Signal-to-Noise Ratio (SNR). This paper is concerned with the development and application of quadrature mirror filters (QMF) for improving the performance of AIC. A new system is proposed to estimate the number of sources by applying AIC to the outputs of filter bank consisting quadrature mirror filters (QMF). The proposed system can estimate the number of sources under low signal-to-noise ratio (SNR).
Abstract
Zigbee is considered to be one of the wireless sensor networks (WSNs) designed for short-range communications applications. It follows IEEE 802.15.4 specifications that aim to design networks with lowest cost and power consuming in addition to the minimum possible data rate. In this paper, a transmitter Zigbee system is designed based on PHY layer specifications of this standard. The modulation technique applied in this design is the offset quadrature phase shift keying (OQPSK) with half sine pulse-shaping for achieving a minimum possible amount of phase transitions. In addition, the applied spreading technique is direct sequence spread spectrum (DSSS) technique, which has
... Show MoreData centric techniques, like data aggregation via modified algorithm based on fuzzy clustering algorithm with voronoi diagram which is called modified Voronoi Fuzzy Clustering Algorithm (VFCA) is presented in this paper. In the modified algorithm, the sensed area divided into number of voronoi cells by applying voronoi diagram, these cells are clustered by a fuzzy C-means method (FCM) to reduce the transmission distance. Then an appropriate cluster head (CH) for each cluster is elected. Three parameters are used for this election process, the energy, distance between CH and its neighbor sensors and packet loss values. Furthermore, data aggregation is employed in each CH to reduce the amount of data transmission which le
... Show MoreThis work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.
This study was carried out to evaluate the hepato-protective property of (Arachis hypogea L.) peanut skin extracts in CCl4 induced hepatotoxicity in mice. The antioxidant activity was measured utilizing 2, 2-diphenyl-1-1 picrylhydrazyl (DPPH) radical scavenging capacity. The results showed that the methanolic extract was the highest free radical scavenging activity than the aqueous extract with values (92.34 ± 0.45 and 87.62 ± 0.44) respectively in 12 mg/mL compared to 89.61 ± 0.34 for Butylated hydroxytoluene (BHT) and 93.25 ± 0.06 for vitamin C, which means that the methanolic extract of peanut skin is superior to BHT. Furthermore, the total phenolic content was analyzed by using Folin-Ciocalteu method, the amount of total phenol in a
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
conventional FCM algorithm does not fully utilize the spatial information in the image. In this research, we use a FCM algorithm that incorporates spatial information into the membership function for clustering. The spatial function is the summation of the membership functions in the neighborhood of each pixel under consideration. The advantages of the method are that it is less
sensitive to noise than other techniques, and it yields regions more homogeneous than those of other methods. This technique is a powerful method for noisy image segmentation.