Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
In this paper, a Bayesian analysis is made to estimate the Reliability of two stress-strength model systems. First: the reliability of a one component strengths X under stress Y. Second, reliability of one component strength under three stresses. Where X and Y are independent generalized exponential-Poison random variables with parameters (α,λ,θ) and (β,λ,θ) . The analysis is concerned with and based on doubly type II censored samples using gamma prior under four different loss functions, namely quadratic loss function, weighted loss functions, linear and non-linear exponential loss function. The estimators are compared by mean squared error criteria due to a simulation study. We also find that the mean square error is
... Show MoreThis paper concerns with deriving and estimating the reliability of the multicomponent system in stress-strength model R(s,k), when the stress and strength are identical independent distribution (iid), follows two parameters Exponentiated Pareto Distribution(EPD) with the unknown shape and known scale parameters. Shrinkage estimation method including Maximum likelihood estimator (MLE), has been considered. Comparisons among the proposed estimators were made depending on simulation based on mean squared error (MSE) criteria.
The study aims at analyzing the inconsistent structural and semantic aspects found in the plays of N.A Ostrovsky. The analysis, that includes all the linguistics schools of thoughts in modern Russian language, is performed chronologically to clarify all the ambiguities that the Russian language learners may face. Such difficulties lie in the use of inconsistent aspects with complete declarative sentences and adverbial clauses. Hence, it constructs a new sentence category that consists of secondary clause and its syncretism semantic.
The study illustrates the wide scope of both studying the sentence inconsistent
... Show MoreThe primary purpose of this subject is to define new games in ideal spaces via set. The relationships between games that provided and the winning and losing strategy for any player were elucidated.
The aim of this research is to study some types of fibrewise fuzzy topological spaces. The six major goals are explored in this thesis. The very first goal, introduce and study the notions types of fibrewise topological spaces, namely fibrewise fuzzy j-topological spaces, Also, we introduce the concepts of fibrewise j-closed fuzzy topological spaces, fibrewise j-open fuzzy topological spaces, fibrewise locally sliceable fuzzy j-topological spaces and fibrewise locally sectionable fuzzy j-topological spaces. Furthermore, we state and prove several Theorems concerning these concepts, where j={δ,θ,α,p,s,b,β} The second goal is to introduce weak and strong forms of fibrewise fuzzy ω-topological spaces, namely the fibrewise fuz
... Show MoreExploration activities of the oil and gas industry generate loads of formation water called produced water (PW) up to thousands of tons each day. Depending on the geographic area, formation depth, oil production techniques, and age of oil supply wells, PW from different oil fields contain different chemical compositions. Currently, PW is also known as industrial waste water containing heavy metals that are toxic to humans and the environment, requiring special processing so that they can be disposed of in the environment. To determine the heavy metals content in PW from the Al-Ahdab oil field (AOF), the Ministry of Science and Technology/Agricultural Research Department determined som
The diseases presence in various species of fruits are the crucial parameter of economic composition and degradation of the cultivation industry around the world. The proposed pear fruit disease identification neural network (PFDINN) frame-work to identify three types of pear diseases was presented in this work. The major phases of the presented frame-work were as the following: (1) the infected area in the pear fruit was detected by using the algorithm of K-means clustering. (2) hybrid statistical features were computed over the segmented pear image and combined to form one descriptor. (3) Feed forward neural network (FFNN), which depends on three learning algorithms of back propagation (BP) training, namely Sca
... Show MoreThis paper is concerned with preliminary test double stage shrinkage estimators to estimate the variance (s2) of normal distribution when a prior estimate of the actual value (s2) is a available when the mean is unknown , using specifying shrinkage weight factors y(×) in addition to pre-test region (R).
Expressions for the Bias, Mean squared error [MSE (×)], Relative Efficiency [R.EFF (×)], Expected sample size [E(n/s2)] and percentage of overall sample saved of proposed estimator were derived. Numerical results (using MathCAD program) and conclusions are drawn about selection of different constants including in the me
... Show More