Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
The analysis and efficiency of phenol extraction from the industrial water using different solvents, were investigated. To our knowledge, the experimental information available in the literature for liquid-liquid equilibria of ternary mixtures containing the pair phenol-water is limited. Therefore the purpose of the present investigation is to generate the data for the water-phenol with different solvents to aid the correlation of liquid-liquid equilibria, including phase diagrams, distribution coefficients of phenol, tie-lines data and selectivity of the solvents for the aqueous phenol system.
The ternary equilibrium diagrams and tie-lines
... Show MoreThis research was aimed to study the osmotic efficiency of the draw solutions and the factors affecting the performance of forward osmosis process : The draw solutions used were magnesium sulfate hydrate (MgSO4.7H2O) pojtassium chloride (KCL), calcium chloride (CaCl2) and ammonium bicarbonate (NH4HCO3). It was found that water flux increases with increasing draw solution concentration, and feed solution flow rate and decreases with increasing draw solution flow rate and feed solution concentration. And also found that the efficiency of the draw solutions is in the following order:
CaCl2> KCI > NH4HCO3> MgSO4.7H
Membrane manufacturing system was operated using dry/wet phase inversion process. A sample of hollow fiber membrane was prepared using (17% wt PVC) polyvinyl chloride as membrane material and N, N Dimethylacetamide (DMAC) as solvent in the first run and the second run was made using (DMAC/Acetone) of ratio 3.4 w/w. Scanning electron microscope (SEM) was used to predict the structure and dimensions of hollow fiber membranes prepared. The ultrafiltration experiments were performed using soluble polymeric solute poly ethylene glycol (PEG) of molecular weight (20000 Dalton) 800 ppm solution 25 °C temperature and 1 bar pressure. The experimental results show that pure water permeation increased from 25.7 to 32.2 (L/m2.h.bar) by adding a
... Show MoreStudy of group action of stone columns using FEM
Magnetic Resonance Imaging (MRI) uses magnetization and radio waves, rather than x-rays to make very detailed, cross- sectional pictures of the brain. In this work we are going to explain some procedures belongs contrast and brightness improvement which is very important in the improvement the image quality such as the manipulation with the image histogram. Its has been explained in this worked the histogram shrink i.e. reducing the size of the gray level gives a dim low contrast picture is produced, where, the histogram stretching of the gray level was distributed on a wide scale but there is no increase in the number of pixels in the bright region. The histogram equalization has also been discuss together with its effects of the improveme
... Show MoreIn this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.