The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the Normalized cross Correlation (NC). The experiments shows the error ratio of the proposed technique is (8%) while accuracy ratio is (92%) when the Curvelet Transform (CvT) is …
Employing phase-change materials (PCM) is considered a very efficient and cost-effective option for addressing the mismatch between the energy supply and the demand. The high storage density, little temperature degradation, and ease of material processing register the PCM as a key candidate for the thermal energy storage system. However, the sluggish response rates during their melting and solidification processes limit their applications and consequently require the inclusion of heat transfer enhancers. This research aims to investigate the potential enhancement of circular fins on intensifying the PCM thermal response in a vertical triple-tube casing. Fin arrays of non-uniform dimensions and distinct distribution patterns were des
... Show MoreModified bentonite has been used as effective sorbent material for the removal of acidic dye (methyl orange) from aqueous solution in batch system. The natural bentonite has been modified using cationic surfactant (cetyltrimethyl ammonium bromide) in order to obtain an efficient sorbent through converting the properties of bentonite from hydrophilic to organophilic. The characteristics of the natural and modified bentonite were examined through several analyses such as Scanning electron microscopy (SEM), Fourier transform infrared spectroscopy (FTIR), and Surface area. The batch study was provided the maximum dye removal efficiency of 88.75 % with a sorption capacity of 555.56 mg/g at specified conditions (150 min, pH= 2, 250 rpm, and 0.
... Show MoreFeature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall
... Show MoreSolar energy is still commonly used to produce clean drinking water due to its simple construction, low maintenance, and ecofriendliness. This work aims to experimentally investigate the yield upgrade and the thermal performance of a novel concentrated single‐axis tracking trough tubular solar still (TSS). This tubular still is identified by three baffles that generate four interrupted sections in the U‐receiver, which is inserted with copper mesh and fitted in a hexagonal‐shaped glass cover. Two identical TSS models were side‐by‐side outdoor tested in Baghdad‐Iraq 33.3° N and 43.3° E from January to March 2024. The first is inserted with black copper mesh (Model I), and the other h
In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators