Internet technology has revolutionized the landscape of communication technologies in the modern era. However, because the internet is open to the public, communication security cannot be guaranteed. As a result, data concealment approaches have been developed to ensure confidential information sharing. Various methods have emerged to achieve the goal of secure data communication via multimedia documents. This study proposes a method, which is both adaptable and imperceptible, for concealing a secret text in a color image. From an adaptivity perspective, image corners are detected using the Harris corner detection algorithm and utilized as anchor points for picking the optimal hiding regions of interest using Bezier curve interp
... Show MoreBackground: Nowadays, the environmentally friendly procedures must be developed to avoid using harmful compounds in synthesis methods. Their increase interest in creating and researching silver nanoparticles (AgNPs) because of their numerous applications in many fields especially medical fields such as burn, wound healing, dental and bone implants, antibacterial, viral, fungal, and arthropodal activities. Biosynthesis of nanoparticles mediated pigments have been widely used as antimicrobial agent against microorganisms. Silver nanoparticles had synthesized by using melanin from locally isolate Pseudomonas aeruginosa, and used as antimicrobial activity against pathogenic microorganisms. Aim of the study: Isolation of Pseudomonas aeruginosa
... Show MoreIn this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.
The estimation of recharge to ground water is the important basics to improve the use of ground water with other available resources, and to save ground water resource from depletion, especially when using large quantity of ground water during a long time such as for agricultural purposes. Al-Wand River Basin in Iraq suffers from water shortage of its requirement of Blajo–Al-Wand Project, and to cover this shortage, the ground water plays a good role to overcome this problem. In this study, three methods were used to estimate the recharge and ground water storage for Al-Wand Basin, these methods are: Water Table Fluctuation (WTF), Water Balance of Climatic for Basin, and Water Table Balance for Basin. The results showe
... Show MoreIn the present work, zeolite Y has been synthesized successfully by sol-gel method.Zeolite was synthesized by crystallization of the final gel which consist from seeding and feed stock gels at 85 oC. HY zeolite was prepared by an ion exchange process with ammonium chloride solution and then loaded with different percentages of platinum and titanium by the wet - impregnation method.
X-ray Diffraction (XRD), X-ray Florescence (XRF), Scanning Electron Microscopy (SEM), BET surface area and, Crushing strength were used to characterize the synthesized and prepared catalysts . Results showed high crystallinity 90% with silica to alumina ratio 5 for HY, high surface area of 600 m2/g and pore
... Show MoreIn this paper, the series solution for unsteady flow for an incompressible viscous electrically conducting fluid of second grad over a stretching sheet subject to a transverse magnetic field is presented by using homotopy analysis method (HAM). Also we examines the effects of viscoelastic parameter, magnetic parameter and time which they control the equation of motion.
This paper presents the non-linear finite element method to study the behavior of four reinforced rectangular concrete MD beams with web circular openings tested under two-point load. The numerical finite elements methods have been used in a much more practical way to achieve approximate solutions for more complex problems. The ABAQUS /CAE is chosen to explore the behavior of MD beams. This paper also studies, the effect of both size and shape of the circular apertures of MD beams. The strengthening technique that used in this paper is externally strengthening using CFRP around the opening in the MD beams. The numerical results were compared to the experimental results in terms of ultimate load failure and displace
... Show MoreIn this paper, we present an approximate method for solving integro-differential equations of multi-fractional order by using the variational iteration method.
First, we derive the variational iteration formula related to the considered problem, then prove its convergence to the exact solution. Also we give some illustrative examples of linear and nonlinear equations.
In this paper, we apply a new technique combined by a Sumudu transform and iterative method called the Sumudu iterative method for resolving non-linear partial differential equations to compute analytic solutions. The aim of this paper is to construct the efficacious frequent relation to resolve these problems. The suggested technique is tested on four problems. So the results of this study are debated to show how useful this method is in terms of being a powerful, accurate and fast tool with a little effort compared to other iterative methods.