the research ptesents a proposed method to compare or determine the linear equivalence of the key-stream from linear or nonlinear key-stream
Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreThis aim of this study is to assess the Tigris River sediments and utilize them as a new abrasive for the preparation of polished surface of magnetite ore to be studied under reflected light ore microscope. Such polishing process was tested using 250, 125, 71, 45, 25 and 18μm grain sizes of the river sediments. For the completion of the polishing and to obtain a glossy perfect polished surface, the 7 and 2.5 μm sized standard diamond pastes were used. After each polishing stage, the reflectance and roughness of these surfaces were measured as an evaluation step for the polishing efficiency. The reflectance values (R%) of the magnetite surface were found to be reversely proportioned to the abrasive grain size; while the surface roughnes
... Show MoreIn the present study rice microsatellite marker (RM 171) was used to evaluate the genetic diversity and determining cultivar identity among ten rice varieties (oryza sativa L.) (Seven local and three commercial varieties). PCR technique was performed using two specific primers. The result showed presence of a band (305bp) DNA sequencing was done to PCR product to detect sequence variation between the ten rice varieties. In order to detect the relationship among all varieties, alignment of RM171 marker sequence was carried out for each variety. Amber and Daawat varieties showed the highest similarity with 98% identity, while the difference (2%) consists of two gaps and two transition mutations (T/C) and (C/T). Furthermore, Amber was align
... Show MoreA new Turbidimetric method characterized by simplicity, accuracy and speed for determination of iron(III) in drug samples by continuous flow injection analysis. The method was based on the formation of complex for iron(III) with 8-hydroxyquinoline in presence of ammonium acetate as a medium for the formation of deep green precipitate and this precipitate was determined using homemade Linear Array Ayah-5SX1-T-1D continuous flow injection analyser. The optimum parameters were 2.6 mL.min-1 flow rate using H2O as a carrier, 1.9 mL.min-1 (14 mmol.L-1) ammonium acetate, 2.4 mL.min-1 (14 mmol.L-1) 8-hydroxyquinoline, 60 L sample volume and open valve for the purge of the sample segment. Data treatment shows that linear range 0.1-8.0 mmol.L-1
... Show MoreFuture wireless communication systems must be able to accommodate a large number of users and simultaneously to provide the high data rates at the required quality of service. In this paper a method is proposed to perform the N-Discrete Hartley Transform (N-DHT) mapper, which are equivalent to 4-Quadrature Amplitude Modulation (QAM), 16-QAM, 64-QAM, 256-QAM, … etc. in spectral efficiency. The N-DHT mapper is chosen in the Multi Carrier Code Division Multiple Access (MC-CDMA) structure to serve as a data mapper instead of the conventional data mapping techniques like QPSK and QAM schemes. The proposed system is simulated using MATLAB and compared with conventional MC-CDMA for Additive White Gaussian Noise, flat, and multi-path selective fa
... Show MoreHuman health can be negatively impacted by exposure to loud noise, which can harm the auditory system. Traffic noise is the leading cause of noise pollution. This paper studies the problem of noise pollution on the roads in Baghdad, Iraq. Due to the increase in vehicle numbers and road network modifications in Baghdad, noise levels became a serious topic to be studied. The aim of the paper was thus to study traffic noise levels and the effect of the traffic stream on noise levels and to formulate a prediction model that identified the guidelines used for designing or developing future roads in the city. Then, the noise levels were measured based on five variables: the functional classification of roads, traffic flow, vehicle speed,
... Show MoreCryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o
... Show More