Steganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount. These methods embed the data in a random location with a random amount, further enhancing the level of obfuscation. A pseudo-random binary key that is generated through a nonlinear combination of eight Linear Feedback Shift Registers (LFSRs) controls this randomness. The experimentation involves various 512x512 cover images. The first method achieves an average PSNR of 43.5292 with a payload capacity of up to 16% of the cover image. In contrast, the second method yields an average PSNR of 38.4092 with a payload capacity of up to 8%. The performance analysis demonstrates that the LSB-based method can conceal more data with less visibility, however, it is vulnerable to simple image manipulation. On the other hand, the DCT-based method offers lower capacity with increased visibility, but it is more robust.
The present study investigates the effect of the de-sanding (recycling system) on the bearing capacity of the bored piles. Full-scale models were conducted on two groups of piles, the first group was implemented without using this system, and the second group was implemented using the recycling system. All piles were tested by static load test, considering the time factor for which the piles were implemented. The test results indicated a significant and clear difference in the bearing capacity of the piles when using this system. The use of the recycling system led to a significant increase in the bearing capacity of the piles by 50% or more. Thus it was possible to reduce the pile length by (15 % or more) thus, and implementation costs
... Show MoreThis paper deals with prediction the effect of soil remoulding (smear) on the ultimate bearing capacity of driven piles. The proposed method based on detecting the decrease in ultimate bearing capacity of the pile shaft (excluding the share of pile tip) after sliding downward. This was done via conducting an experimental study on three installed R.C piles in a sandy clayey silt soil. The piles were installed so that a gap space is left between its tip and the base of borehole. The piles were tested for ultimate bearing capacity
according to ASTM D1143 in three stages. Between each two stages the pile was jacked inside the borehole until a sliding of about 200mm is achieved to simulate the soil remoulding due to actual pile driving. T
This research presents the possibility of using banana peel (arising from agricultural production waste) as biosorbent for removal of copper from simulated aqueous solution. Batch sorption experiments were performed as a function of pH, sorbent dose, and contact time. The optimal pH value of Copper (II) removal by banana peel was 6. The amount of sorbed metal ions was calculated as 52.632 mg/g. Sorption kinetic data were tested using pseudo-first order, and pseudo-second order models. Kinetic studies showed that the sorption followed a pseudo second order reaction due to the high correlation coefficient and the agreement between the experimental and calculated values of qe. Thermodynamic parameters such as enthalpy change (ΔH
... Show MoreThis research aims to utilize a complementarity of field excavations and laboratory works with spatial analyses techniques for a highly accurate modeling of soil geotechniques properties (i.e. having lower root mean square error value for the spatial interpolation). This was conducted, for a specified area of interest, firstly by adopting spatially sufficient and well distributed samples (cores). Then, in the second step, a simulation is performed for the variations in properties when soil is contaminated with commonly used industrial material, which is white oil in our case. Cohesive (disturbed and undisturbed) soil samples were obtained from three various locations inside Baghdad University campus in AL-J
... Show MoreNations witnessed since its existence a state of wills conflict as a result of the intersection and intertwining of interests, through which it sought to achieve its goals and objectives, and this has often led to direct military conflicts and countless wars, and witnessed the entry into global wars in which humanity lost millions of lives and losses .Despite the great changes in the international arena, especially in recent decades, the conflict of wills has not ceased, although some of its features and forms have changed, and it has become more complicated after the withdrawal of this conflict to international organizations and bodies, including the Security Council. It is mandated under the Charter of the United Nations to wor
... Show MoreBlockchain technologies have grown in popularity over the last few years, with various experts touting the technology's potential applications in a range of businesses, markets, organizations, and governmental institutions. In the brief history of blockchain, an astounding number of incredible implementations have been done in terms of how it may be utilized and the potential effect it may have on a range of sectors. And, because of the great number and complexity of these characteristics, addressing the blockchain's potential and complications can be difficult, especially when seeking to address its purpose and fit for a certain activity. The blockchain's practical skills in fixing multiple challenges that are currently prevent
... Show MoreBecloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pay
... Show MoreThe organizational structure of relations between states is among the main features that distinguished the twentieth century as the era of international organization, especially after the increase in the number of political units after World War II in which regionalism was crystallized as a phenomenon. It is not modern, as there are many blocs such as the European Union that have developed in it, the idea of regional bloc is prominent, especially in Europe, as it emerged after a controversy revolved around what was called globalism in the face of Globalism vs. Regionalism. Regional, as the proponents of the global orientation saw the establishment of a global organization that includes all countries, as the best way to achieve inte
... Show MoreThe study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The ro
... Show MorePeople are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o
... Show More