The hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compression of the stego-image raster in L2 and L3 using a 2-D wavelet packet. The outcome is a highly efficient algorithm, which can rapidly conceal information inside transmitted satellite images, thus guarding against revealing information to potential cyber-attackers.
In this work we present a technique to extract the heart contours from noisy echocardiograph images. Our technique is based on improving the image before applying contours detection to reduce heavy noise and get better image quality. To perform that, we combine many pre-processing techniques (filtering, morphological operations, and contrast adjustment) to avoid unclear edges and enhance low contrast of echocardiograph images, after implementing these techniques we can get legible detection for heart boundaries and valves movement by traditional edge detection methods.
The aim of the study is to detect the malignant conditions of the skin tumors through the features of optical images. This research included some of image processing techniques to detect skin cancer as a strong threat to human beings' lives. Using image processing and analysis methods to improves the ability of pathologists to detect this disease leading to more specified diagnosis and better treatment of them. One hundred images were collected from Benign and Malignant tumors and some appropriate image features were calculated, like Maximum Probability, Entropy, Coefficient of Variation, Homogeneity and Contrast, and using Minimum Distance method to separate these images. These features with Minimum Distance as a proposed making decision a
... Show MoreZubair Formation is one of the richest petroleum systems in Southern Iraq. This formation is composed mainly of sandstones interbedded with shale sequences, with minor streaks of limestone and siltstone. Borehole collapse is one of the most critical challenges that continuously appear in drilling and production operations. Problems associated with borehole collapse, such as tight hole while tripping, stuck pipe and logging tools, hole enlargement, poor log quality, and poor primary cement jobs, are the cause of the majority of the nonproductive time (NPT) in the Zubair reservoir developments. Several studies released models predicting the onset of borehole collapse and the amount of enlargement of the wellbore cross-section. However, assump
... Show MoreThe objective of this research is employ the special cases of function trapezoid in the composition of fuzzy sets to make decision within the framework of the theory of games traditional to determine the best strategy for the mobile phone networks in the province of Baghdad and Basra, has been the adoption of different periods of the functions belonging to see the change happening in the matrix matches and the impact that the strategies and decision-making available to each player and the impact on societ
... Show MoreThis study describes the preparation of tetradentate Schiff base derived from the condensation of 2-Hydroxy naphthaldehyde with 2-amine benzhydrazide and the synthesis of new complexes series with a good yield.The prepared ligand was characterized using a microanalysis technique, UV-visible, FT-IR, nuclear magnetic resonance 1H-NMR, mass spectrometry, thermal gravimetric analysis TGA, and the addition of conductivity measurement and magnetic moment of complexes. The invitro antimicrobial activity of the prepared compounds was tested against Gram-negative Klebsiella pneumonia, Gram-positive Staphylococcus aureu, and Candida albicans by the agar well diffusion method. The spectroscopy and measurement studies showed that the li
... Show MoreVideo copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show MoreUrban expansion and its environmental and safety effects are one of the critical information needed for future development planning, safety considerations and environmental management. This work used two methods to monitor urban expansion and it's environmental and safety effects, the first is based on Google Maps for the years 2002 and 2010, and the second was the usage of spatial videos for the year 2013. Although the usage of satellite images is critical to know and investigate the general situation and the total effects of the expansion on a large piece of area, but the Spatial videos do a very detailed fine scale investigation, site conditions regarding both environmental and safety cannot be easily distinguished fr
... Show MoreIn this paper, we introduce the notion of a 2-prime module as a generalization of prime module E over a ring R, where E is said to be prime module if (0) is a prime submodule. We introduced the concept of the 2-prime R-module. Module E is said to be 2-prime if (0) is 2-prime submodule of E. where a proper submodule K of module E is 2-prime submodule if, whenever rR, xE, E, Thus xK or [K: E].
structural and electrical of CuIn (Sex Te1-x)2