The digital multimedia systems become standard at this time because of their extremely sensory activity effects and also the advanced development in its corresponding technology. Recently, biological techniques applied to several varieties of applications such as authentication protocols, organic chemistry, and cryptography. Deoxyribonucleic Acid (DNA) is a tool to hide the key information in multimedia platforms.
In this paper, an embedding algorithm is introduced; first, the image is divided into equally sized blocks, these blocks checked for a small amount color in all the separated blocks. The selected blocks are used to localize the necessary image information. In the second stage, a comparison is between the initial image pixel and the watermark bit pixel is done to select the key that represents the location of a specific bit location that exist in all channels with its most dominant. If the compared bits are equal then (0) is added in least significant bit of least dominant color channel otherwise (1) is added. In the last stage, a regeneration process for the key is done. DNA based cryptographic algorithm has been suggested to develop secures image encryption techniques. This algorithm gives a good results, the MSE was (0.0007) for one test also the key generation method is successful.
Recently, the environmental isotopes are adopted to figure out the hydrological processes, recharge areas, flow paths, groundwater origin and the interaction between different watery bodies. Currently, five samples of the rainwater have been collected since January to April 2012, as well as December 2011. Those sampling periods have highest amounts of precipitation events. Meantime, 25 samples of groundwater, 5 of the Lesser Zab River and 3 of overland flow have been picked up during the wet period. The dry sampling of groundwater and the Lesser Zab River has been achieved in summer 2011. The Local Meteoric Water Line lies between Global Meteoric Water Line (GMWL) and East Mediterranean Water Line (EMWL). The lowest, highest and
... Show MoreThis study was aimed to establish a database of autosomal Short Tandem Repeat (aSTR) DNA allele frequencies for an Iraqi population living in Baghdad city as a reference, therefore, a total of 456 unrelated individuals were analyzed at 15 STR DNA markers (D3S1358, vWA, FGA, D8S1179, D21S11, D18S51, D5S818, D13S317, D7S820, TH01, TPOX, CSF1PO, D19S433, D2S1338, D16S539) included in the Kit from Applied Biosystems. The obtained results revealed that the Combined Matching Probability (CMP) was estimated at 1 in 3.3287 × 10-18, and the Combined Discrimination Power (CDP) was greater than 0.98600987, which is comparable to values obtained with the many other allele frequency databases used in forensic investigations. It can be con
... Show MorePlane cubics curves may be classified up to isomorphism or projective equivalence. In this paper, the inequivalent elliptic cubic curves which are non-singular plane cubic curves have been classified projectively over the finite field of order nineteen, and determined if they are complete or incomplete as arcs of degree three. Also, the maximum size of a complete elliptic curve that can be constructed from each incomplete elliptic curve are given.
Abstract:
This research aimed to shed light on the juristic rulings concerning those in debts. It adopted the inductive approach, the analytical approach and the comparative approach. It tackled the following issues: definition of Zakat, the channels of paying Zakat, definition of those in debts, types of those in debts, those in debts who are not entitled to take Zakat, their cases, spending money by those in debts if taken by those in debts and the poor, and when those in debts become rich before paying their debts, and the ruling on paying the debt of the dead indebted from the Zakat money.
The most important results of the research are as follows:
Muslim jurists
... Show MoreIn this research the performance of 5G mobile system is evaluated through the Ergodic capacity metric. Today, in any wireless communication system, many parameters have a significant role on system performance. Three main parameters are of concern here; the source power, number of antennas, and transmitter-receiver distance. User equipment’s (UEs) with equal and non-equal powers are used to evaluate the system performance in addition to using different antenna techniques to demonstrate the differences between SISO, MIMO, and massive MIMO. Using two mobile stations (MS) with different distances from the base station (BS), resulted in showing how using massive MIMO system will improve the performance than the standar
... Show MoreIn this paper, our aim is to solve analytically a nonlinear social epidemic model as an initial value problem (IVP) of ordinary differential equations. The mathematical social epidemic model under study is applied to alcohol consumption model in Spain. The economic cost of alcohol consumption in Spain is affected by the amount of alcohol consumed. This paper refers to the study of alcohol consumption using some analytical methods. Adomian decomposition and variation iteration methods for solving alcohol consumption model have used. Finally, a compression between the analytic solutions of the two used methods and the previous actual values from 1997 to 2007 years is obtained using the absolute and
... Show MoreDiverting river flow during construction of a main dam involves the construction of cofferdams, and tunnels, channels or other temporary passages. Diversion channels are commonly used in wide valleys where the high flow makes tunnels or culverts uneconomic. The diversion works must form part of the overall project design since it will have a major impact on its cost, as well as on the design, construction program and overall cost of the permanent works. Construction costs contain of excavation, lining of the channel, and construction of upstream and downstream cofferdams. The optimization model was applied to obtain optimalchannel cross section, height of upstream cofferdam, and height of downstream cofferdamwith minimum construction cost
... Show MorePseudomonas aeruginosa is an opportunistic pathogen. Quorum sensing (QS) is one of processes that are responsible for biofilm formation. P. aeruginosa can live in different environments, some of which are pathogenic (clinical isolates) and some that are found outside the body (environmental isolates). The present study aimed to determine the presence of a number of genes responsible for QS in clinical and environmental isolates of P. aeruginosa. In the present study full DNA was separated from all environmental and clinical isolates that contained seven genes (rhlA, rhlR, rhlI, lasR, lasI, lasB, phzA1) associated with QS occurrence. The tot
... Show MoreThe intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents. But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..
In this research LSB technique has been used
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show More