Benthic invertebrates were used as bio- indicators to evaluate the pollution in -Diwania River . Five stations were selected for this purpose , extending from A1 -?? rtream to A1- Sadeer District downstream . The percentage of?ct uP?str?^ ? ?, oligochaeta to total benthic invertebrates were calculated . The population density of evaluation. 'I'he results Were ??? Tubificid worms without hair ehaetae was ©iso used IOBS(01igochaete Index of Sediment Bioindicati©n ), TUSP ? presented as indices Io (Tubificidae Species Percentage ) & degree of pollution Eo . IT was noticed that the 0 in??37.17 percentage of ©lig©chaeta to the total benthic invertebrates ranged between to 60.685 in station 3 , while the percentage ©f Tubificid w©rms t© ©ther ? stati©n oligochaeta ranged from 32% in station 2 to 74.17% in station 3.Io values ranged between 21.3 in station 3 to 22.3 in station I , while lobs index showed a higher value 7.62 in station 3 and lawer value 2.43 in station 3 .the higher value of TUSP index was 32,5 in stati©n 5 and the lawer valus was 15.9 in station 1 . Pollution degree F 1 ( percentage ©f Tubificidae without hair M/gg& ? was rec©rded in stati©n 5-96 respectively ) and degree E in station 3,4&5 (percentage of Tubificidae & ?4-? without hair ehaetae was 15.95 , 15.95 & 16.16 respectively ). According to these results, stati©n 1 & 2 may be regarded as free fr©m p©lluti©n , while the other stations . were considered as slightly p©lluted
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreFractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreIn this research, we introduce and study the concept of fibrewise bitopological spaces. We generalize some fundamental results from fibrewise topology into fibrewise bitopological space. We also introduce the concepts of fibrewise closed bitopological spaces,(resp., open, locally sliceable and locally sectionable). We state and prove several propositions concerning with these concepts. On the other hand, we extend separation axioms of ordinary bitopology into fibrewise setting. The separation axioms we extend are called fibrewise pairwise T_0 spaces, fibrewise pairwise T_1 spaces, fibrewise pairwise R_0 spaces, fibrewise pairwise Hausdorff spaces, fibrewise pairwise functionally Hausdorff spaces, fibrewise pairwise regular spaces, fibrewise
... Show MoreThis study aims to focus on the Motives behind volunteer work among a sample of volunteers working in civil society organizations and check if there are statistical differences with those variables according to (gender, age, job, period of volunteer work, and residence. The sample consists of (220 )volunteers,(189) male and(31) female from southern, northern and central governorate .The Volunteer Functions Inventory(VFI)(Clary & et al,1989)was applied, It consisting of(30) items with six fields( Values, Understanding, Social motives, Career, Protective, Enhancement).
The results show that the most common and important motivations are (Values, Understanding, and social motivations), there are differenc
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreKE Sharquie, AA Noaimi, WK Al-Janabi, Journal of Cosmetics, Dermatological Sciences and Applications, 2013