A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
This research is studying technique sculptures super - realism, search through, how the method of work, and the search for the materials used in their manufacture, and this is the first study in the field of art and the field of academic study in the country.Research consists of an introduction, And four sections, The introduction containing information on: research problem, Importance of research, Goals of the research, Limits of research, research approach, and research tools.The first section contains a technical study sculptures super -realism in contemporary sculpture, while the second section includes a search for alternative materials available in the local markets, for making sculptures super - realism, the third section dedicate
... Show MoreFormation of Au–Ag–Cu ternary alloy nanoparticles (NPs) is of particular interest because this trimetallic system have miscible (Au–Ag and Au–Cu) and immiscible (Ag– Cu) system. So there is a possibility of phase segregation in this ternary system. At this challenge it was present attempts synthetic technique to generate such trimetallic alloy nanoparticles by exploding wire technique. The importance of preparing nanoparticles alloys in distilled water and in this technique makes the possibility of obtaining nanoparticles free of any additional chemical substance and makes it possible to be used in the treatment of cancer or diseases resulting from bacterial or virus with least toxic. In this work, three metals alloys Au-Ag-Cu
... Show MoreThe present study has examined the spatiotemporal varieties of the demographics of the Shatt Al-Arab River fishes and their relation to some ecological components. The aim is to forecast these groups in the unexplored parts of the waterway with an emphasis on environmental indices of diversity. Three sites in the river were selected as an observation and study of these species, which lasted from March 2019 to February 2020, the study dealt with factors affecting fishes, as Water Temperature (WT), Dissolved Oxygen (DO), Potential Hydrogen Ion (pH), Salinity (Sal), and Transparency (Tra). Gill nets, cast nets, hooks, and hand nets were adopted to collecting fish. The results indicated that the fish population comprises 60 species represent
... Show MoreBackground: Alveolar ridge expansion is proposed when the alveolar crest thickness is ≤5 mm. The screw expansion technique has been utilized for many years to expand narrow alveolar ridges. Recently, the osseodensification technique has been suggested as a reliable technique to expand narrow alveolar ridges with effective width gain and as little surgical operating time as possible. The current study aimed to compare osseodensification and screw expansion in terms of clinical width gain and operating time. Materials and methods: Forty implant osteotomies were performed in deficient horizontal alveolar ridges (3–5 mm). A total of 19 patients aged 21–59 years were randomized into two groups: the screw expansion group, which invo
... Show MoreIn this study, a 3 mm thickness 7075-T6 aluminium alloy sheet was used in the friction stir welding process. Using the design of experiment to reduce the number of experiments and to obtain the optimum friction stir welding parameters by utilizing Taguchi technique based on the ultimate tensile test results. Orthogonal array of L9 (33) was used based on three numbers of the parameters and three levels for each parameter, where shoulder-workpiece interference depth (0.20, 0.25, and 0.3) mm, pin geometry (cylindrical thread flat end, cylindrical thread with 3 flat round end, cylindrical thread round end), and thread pitch (0.8, 1, and 1.2) mm) this technique executed by Minitab 17 software. The results showed th
... Show MoreThis article aims to establish and evaluate standards for critical equipment and materials in highway projects in Iraq. Delphi technique has been used to analyze, explore, and discover the main criteria and sub-criteria that affect equipment and materials in highway construction projects in Iraq. To determine the correct response to the criteria presented in this study, a program (IBM, SPSS/V25) was used to assess the main criteria and sub-criteria using the mean score (MS) and standard deviation (SD) technique, as well as to check reliability using Cronbach's alpha factor (α). The experts' qualifications and the extent to which the person is ready to commit are both important factors in panel selection. The design of a
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreIn this work we present a technique to extract the heart contours from noisy echocardiograph images. Our technique is based on improving the image before applying contours detection to reduce heavy noise and get better image quality. To perform that, we combine many pre-processing techniques (filtering, morphological operations, and contrast adjustment) to avoid unclear edges and enhance low contrast of echocardiograph images, after implementing these techniques we can get legible detection for heart boundaries and valves movement by traditional edge detection methods.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More