The hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compression of the stego-image raster in L2 and L3 using a 2-D wavelet packet. The outcome is a highly efficient algorithm, which can rapidly conceal information inside transmitted satellite images, thus guarding against revealing information to potential cyber-attackers.
This study deal with structural and stratigraphic analysis of the seismic reflection data for Hartha Formation at Nasiriyah field, the area of seismic data is about (1237) km2. Nasiriyah oil field is located in Dhi Qar Governorate, southern Iraq, and the oil field is located to the East of Euphrates River of about (38) km northwest of Nasiriyah city. which includes twenty-four (24) wells. In some wells there are oil evidences in Hartha Formation at Nasiriyah oil field, for this reason, Hartha Formation is studied.
Two reflectors are picked (top and bottom Hartha) they are defined by using synthetic seismograms in time domain for wells (Ns-1, and 3). Time and depth of Hartha Formation are drawn using velocity data of reflectors. The st
Background and purpose: Animal model helps researchers to evaluate new treatment plan for human and understand pathological mechanism involved in a development of disease. The use of rats as an animal model for Alzheimer's research has become a favorite among researchers. Rats are capable in mimicking Alzheimer disease due to their intelligence and quick adaptation to nature. At present there are several methods that can be used to induce Alzheimer's animals, but each method has advantages and disadvantages. We need to learn other methods that can provide many advantages and few disadvantages. The Amyloid-beta 42 (Aβ-42) and Reactive Oxygen Species (ROS) are thought to play an important role in the pathology of Alzheimer’s disease. Th
... Show MoreForest fires continue to rise during the dry season and they are difficult to stop. In this case, high temperatures in the dry season can cause an increase in drought index that could potentially burn the forest every time. Thus, the government should conduct surveillance throughout the dry season. Continuous surveillance without the focus on a particular time becomes ineffective and inefficient because of preventive measures carried out without the knowledge of potential fire risk. Based on the Keetch-Byram Drought Index (KBDI), formulation of Drought Factor is used just for calculating the drought today based on current weather conditions, and yesterday's drought index. However, to find out the factors of drought a day after, the data
... Show MoreSpintronic offers a solution by exploiting spin instead of electron charge since spin current propagation can occur in principle without dissipation. One of the applications involve within this project for storage media is heat-assisted magnetic recording (HAMR). The objective of this study is to simulate the behavior of thermal gradient to generate a pure spin current using an ultrafast femtosecond (fs) laser in a nano-sized multilayered structure of (Al2O3/Ni81Fe19 (Py)/Cu/Y3Fe5O12 (YIG)/Gd3Ga5O12 (GGG)) at room temperature. A ferromagnetic/spacer/magnetic insulator nano-sized multilayered is the proposed structure f
... Show MoreIn light of the developments and intense competition that the world has witnessed, the need to search for a sustainable and continuous competitive advantage for economic units has emerged, as the economic units must not lose sight of their interest in the activities they perform to achieve that advantage, and it can be said that the goal of the research is to identify the theoretical dimensions of the green value chain represented by: (Green research and development, green design, green manufacturing, green marketing, green services) and the dimensions of the sustainable competitive advantage represented by (quality, creativity, innovation, cost, response to the customer), as well as identifyi
... Show MoreThis work includes synthesis of sugar tetrazole derivative, D-ribose reacted with acetone in the presence of sulfuric acid H2SO4 to give 2, 3-O-isopropylidene-D-ribose (1). The Aldol condensation of (1) with formaldehyde in methanolic K2CO3 solution gave 2-hydroxymethyl (2, 3-O-isopropylidene-D-ribose)(2). Which was tosylated by Tosyl chloride in pyridine to yield compound (3), SN2 reaction of (3) with sodium cyanide in DMSO afforded compound (4). The [2+ 3] cycloaddition reaction of (4) with sodium azide gave the targeted compound (5). All prepared compounds have been characterized by: TLC, Specific rotation, Microelemental analysis and [FTIR and 1 H NMR spectroscopy]
This deals with estimation of Reliability function and one shape parameter (?) of two- parameters Burr – XII , when ?(shape parameter is known) (?=0.5,1,1.5) and also the initial values of (?=1), while different sample shze n= 10, 20, 30, 50) bare used. The results depend on empirical study through simulation experiments are applied to compare the four methods of estimation, as well as computing the reliability function . The results of Mean square error indicates that Jacknif estimator is better than other three estimators , for all sample size and parameter values
In this research, the problem of ambiguity of the data for the project of establishing the typical reform complex in Basrah Governorate was eliminated. The blurry of the data represented by the time and cost of the activities was eliminated by using the Ranking function and converting them into normal numbers. Scheduling and managing the Project in the Critical Pathway (CPM) method to find the project completion time in normal conditions in the presence of non-traditional relationships between the activities and the existence of the lead and lag periods. The MS Project was used to find the critical path. The results showed that the project completion time (1309.5) dinars and the total cost has reached (33113017769) dinars and the
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreIn the cuurent article, the photophysical properties of 3,6-bis(5-bromothiophen-2-yl)-2,5-bis(2-ethylhexyl)-2,5-dihydropyrrolo[3,4-c]pyrrole-1,4-dione were investigated. The visible absorption bands at 527, 558 and 362 nm in propylene carbonate and the compound was found to be fluorescent in solution and in the plastic film with emission wavelengths between 550- 750 nm. The Stokes Shift of P.C., acetonitrile, diethyl ether, Tetrahydrofuran THF, cyclohexane, dibutyl ether, and dichloromethane DCM are 734, 836, 668, 601, 601, 719, and 804 cm-1 in respectively. The Stokes Shift Δ was less in THF and cyclohexane, than the solvents, which indicates that the energy loss is less between the excitation and fluorescence states. The
... Show More