The digital multimedia systems become standard at this time because of their extremely sensory activity effects and also the advanced development in its corresponding technology. Recently, biological techniques applied to several varieties of applications such as authentication protocols, organic chemistry, and cryptography. Deoxyribonucleic Acid (DNA) is a tool to hide the key information in multimedia platforms.
In this paper, an embedding algorithm is introduced; first, the image is divided into equally sized blocks, these blocks checked for a small amount color in all the separated blocks. The selected blocks are used to localize the necessary image information. In the second stage, a comparison is between the initial image pixel and the watermark bit pixel is done to select the key that represents the location of a specific bit location that exist in all channels with its most dominant. If the compared bits are equal then (0) is added in least significant bit of least dominant color channel otherwise (1) is added. In the last stage, a regeneration process for the key is done. DNA based cryptographic algorithm has been suggested to develop secures image encryption techniques. This algorithm gives a good results, the MSE was (0.0007) for one test also the key generation method is successful.
At atmospheric pressure and at a frequency of 9.1 kHz, a constructed magnetically stabilized tornado gliding arc discharge (MSGAD) system was utilized in this study to generate a non-thermal plasma with an alternating voltage source from 2,4,6,8 to 10 kV. Argon gas was used to generate the arc plasma with an adjustable flow rate using a flow meter regulator to stabilize the gas flow rate to 2 L/min. A gliding plasma discharge is achieved by a magnetic field for the purpose of a planned investigation. The influence of the magnetically stabilized tornado gliding arc discharge parameters such as magnetic field and applied voltage on microscopic tornado plasma parameters was studied. The electron temperature1was measured using a Boltzmann plot
... Show MoreWith the increasing integration of computers and smartphones into our daily lives, in addition to the numerous benefits it offers over traditional paper-based methods of conducting affairs, it has become necessary to incorporate one of the most essential facilities into this integration; namely: colleges. The traditional approach for conducting affairs in colleges is mostly paper-based, which only increases time and workload and is relatively decentralized. This project provides educational and management services for the university environment, targeting the staff, the student body, and the lecturers, on two of the most used platforms: smartphones and reliable web applications by clo
This study can be considered as un introduction to the idioms and the strategy about the productive partnership development connection, that helps the researcher and the organization in their work in to activate development and the natural sources,manegment,to improve the two sides active connected to the local society, and to use it as easier and smoother participation of the people who work in development field and the natural sources management research, That connection depends mostly upon the capability of researcher and the development worker to increase the ability of individual and local society to specify and analyzing their problems and to try solutions to make their life better with good income.
The presence of different noise sources and continuous increase in crosstalk in the deep submicrometer technology raised concerns for on-chip communication reliability, leading to the incorporation of crosstalk avoidance techniques in error control coding schemes. This brief proposes joint crosstalk avoidance with adaptive error control scheme to reduce the power consumption by providing appropriate communication resiliency based on runtime noise level. By switching between shielding and duplication as the crosstalk avoidance technique and between hybrid automatic repeat request and forward error correction as the error control policies, three modes of error resiliencies are provided. The results show that, in reduced mode, the scheme achie
... Show MoreThe present study analyzes the effect of couple stress fluid (CSF) with the activity of connected inclined magnetic field (IMF) of a non-uniform channel (NUC) through a porous medium (PM), taking into account the sliding speed effect on channel walls and the effect of nonlinear particle size, applying long wavelength and low Reynolds count estimates. The mathematical expressions of axial velocity, stream function, mechanical effect and increase in pressure have been analytically determined. The effect of the physical parameter is included in the present model in the computational results. The results of this algorithm have been presented in chart form by applying the mathematical program.
In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreThis study was done to find the effect of Tigris-Therthar channel on the water quality of Tigris River to face the climate change which causes decreasing in water resources, in addition to decreasing in its quality. Nine stations were chosen located on Tigris River, Tigris-Therthar channel, Groundwater, and Therthar lake. The results indicated that the TDS increased in summer season, and the effect of Tigris-Therthar cannel was limited, also the effect of groundwater was limited, but there was an indication refers of possibility of increasing these effects on the quality of water. The study recommends observing the Tigris River through a programme to identify any change in water in future.
Mobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,
... Show MoreSeveral recent approaches focused on the developing of traditional systems to measure the costs to meet the new environmental requirements, including Attributes Based Costing (ABCII). It is method of accounting is based on measuring the costs according to the Attributes that the product is designed on this basis and according to achievement levels of all the Attribute of the product attributes. This research provides the knowledge foundations of this approach and its role in the market-oriented compared to the Activity based costing as shown in steps to be followed to apply for this Approach. The research problem in the attempt to reach the most accurate Approach in the measurement of the cost of products from th
... Show MoreSteganography is a technique to hide a secret message within a different multimedia carrier so that the secret message cannot be identified. The goals of steganography techniques include improvements in imperceptibility, information hiding, capacity, security, and robustness. In spite of numerous secure methodologies that have been introduced, there are ongoing attempts to develop these techniques to make them more secure and robust. This paper introduces a color image steganographic method based on a secret map, namely 3-D cat. The proposed method aims to embed data using a secure structure of chaotic steganography, ensuring better security. Rather than using the complete image for data hiding, the selection of
... Show More