Internet technology has revolutionized the landscape of communication technologies in the modern era. However, because the internet is open to the public, communication security cannot be guaranteed. As a result, data concealment approaches have been developed to ensure confidential information sharing. Various methods have emerged to achieve the goal of secure data communication via multimedia documents. This study proposes a method, which is both adaptable and imperceptible, for concealing a secret text in a color image. From an adaptivity perspective, image corners are detected using the Harris corner detection algorithm and utilized as anchor points for picking the optimal hiding regions of interest using Bezier curve interpolation. On the other hand, because human vision is less sensitive to aberrations in edge regions, imperceptibility is guaranteed by utilizing curves that cross through these regions. Experiments indicate that utilizing gradient selective Bezier curves for secret text concealment can keep the imperceptibility even when the payload capacity is increased.
The current study includes preparing a geometric proposal of the main parameters that must be worked within a seismic reflection survey to prepare a three-dimensional subsurface image. This image represents the Siba oil field located in Basra, southern Iraq. The results were based on two options for selecting these approved elements to create a three-dimensional image of the Mishrif, Zubair and Yamama formations as well as the Jurassic and Permian Khuff and the pre-Khuff reservoir area. The first option is represented in the geometry in option -1 is 12 lines, 6 shots, and 216 chs. The receiver density is 66.67 receivers / km2, so the shot density is the same. Total shots are 21000, which is the same number of receiv
... Show MoreIn this paper, a fast lossless image compression method is introduced for compressing medical images, it is based on splitting the image blocks according to its nature along with using the polynomial approximation to decompose image signal followed by applying run length coding on the residue part of the image, which represents the error caused by applying polynomial approximation. Then, Huffman coding is applied as a last stage to encode the polynomial coefficients and run length coding. The test results indicate that the suggested method can lead to promising performance.
Many cinematic adaptations were produced for the Grimms’ “Little Snow-White” (1812) including Mirror Mirror movie (2012), the contemporary version adapted by Taresm Singh. Singh’s version was able to depict the modern reality of women and went against patriarchy by embracing feminist ideologies of the fourth-wave feminism. Therefore, he challenged the ideologies of the mainstream cinema dominated by the patriarchal élite’s capitalist mode of production that still adhere to the stereotyped patriarchal image of women’s ‘victimization,’ ‘objectification’ and ‘marginalization,’ which did not represent women’s modern reality anymore. This paper, however, is a qualitative study aimed to prove that the femini
... Show MoreAngle of arrival (AOA) estimation for wideband signal becomes more necessary for modern communication systems like Global System for Mobile (GSM), satellite, military applications and spread spectrum (frequency hopping and direct sequence). Most of the researchers are focusing on how to cancel the effects of signal bandwidth on AOA estimation performance by using a transversal filter (tap delay line) (TDL). Most of the researchers were using two elements array antenna to study these effects. In this research, a general case of proposed (M) array elements is used. A transversal filter (TDL) in phase adaptive array antenna system is used to calculate the optimum number of taps required to compensate these effect. The propo
... Show MoreIn this study, the stress-strength model R = P(Y < X < Z) is discussed as an important parts of reliability system by assuming that the random variables follow Invers Rayleigh Distribution. Some traditional estimation methods are used to estimate the parameters namely; Maximum Likelihood, Moment method, and Uniformly Minimum Variance Unbiased estimator and Shrinkage estimator using three types of shrinkage weight factors. As well as, Monte Carlo simulation are used to compare the estimation methods based on mean squared error criteria.
The aim of this paper is to estimate a single reliability system (R = P, Z > W) with a strength Z subjected to a stress W in a stress-strength model that follows a power Rayleigh distribution. It proposes, generates and examines eight methods and techniques for estimating distribution parameters and reliability functions. These methods are the maximum likelihood estimation(MLE), the exact moment estimation (EMME), the percentile estimation (PE), the least-squares estimation (LSE), the weighted least squares estimation (WLSE) and three shrinkage estimation methods (sh1) (sh2) (sh3). We also use the mean square error (MSE) Bias and the mean absolute percentage error (MAPE) to compare the estimation methods. Both theoretical c
... Show MoreThis research presents a new algorithm for classification the
shadow and water bodies for high-resolution satellite images (4-
meter) of Baghdad city, have been modulated the equations of the
color space components C1-C2-C3. Have been using the color space
component C3 (blue) for discriminating the shadow, and has been
used C1 (red) to detect the water bodies (river). The new technique
was successfully tested on many images of the Google earth and
Ikonos. Experimental results show that this algorithm effective to
detect all the types of the shadows with color, and also detects the
water bodies in another color. The benefit of this new technique to
discriminate between the shadows and water in fast Matlab pro
An Auto Crop method is used for detection and extraction signature, logo and stamp from the document image. This method improves the performance of security system based on signature, logo and stamp images as well as it is extracted images from the original document image and keeping the content information of cropped images. An Auto Crop method reduces the time cost associated with document contents recognition. This method consists of preprocessing, feature extraction and classification. The HSL color space is used to extract color features from cropped image. The k-Nearest Neighbors (KNN) classifier is used for classification.
The article reflects the results of the analysis of the use of metaphors as one of the main means used by Lyudmila Ulitskaya when writing the novel “Sincerely Yours Shurik” to form the image of the main hero in the novel. The main purpose of the article is to consider metaphors, which helped the author to form the image of the main character Shurik in the text space through the stages of his life path, closely related to the people around him, who is always happy to be useful (hence the title "Sincerely Yours"), among which the female images of his relatives, girlfriends and others stand out as a special layer in the narrative. And in the course of the study, the following tasks were solved: the metaphors that make up the image of the
... Show MoreThis research examines the issue of Internet banking services and their impact on customer's perceived value to know the potential of Iraqi commercial Banks to provide Internet banking services as well as determine the customer's level of perception of the value of such services. The research aims to demonstrate the effect that Internet banking services have on the customer's perceived value and to find how online banking services can be used to add value that the customer perceive. The main findings were that research sample banks don't have a sophisticated network of electronic Windows through which banking services are provided to allow customers to manage their accounts, and perform various operational operations through the
... Show More