A special methodology for adding a watermark for colored (RGB) image is formed and adding the wavelet transform as a tool during this paper. The watermark is added into two components. The primary one is by taking the key that contain associate eight range from (0...7) every range in it determines the actual bit position in specific component of canopy image. If that bit is analogous to the bit in watermark, (0) are hold on within the Least Significant Bit (LSB) of the watermarked image; otherwise (1) are hold on. The other is that it will add multiple secret keys victimization shift and rotate operations. The watermark is embedded redundantly over all extracted blocks in image to extend image protection. This embedding is completed within the frequency domain using wavelet transform. This improved algorithm incorporates wavelet transform to supply high security for two reasons, the embedded bit won't be hold on in LSB directly and this approach can use multiple secret keys.
There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja
Texture recognition is used in various pattern recognition applications and texture classification that possess a characteristic appearance. This research paper aims to provide an improved scheme to provide enhanced classification decisions and to decrease processing time significantly. This research studied the discriminating characteristics of textures by extracting them from various texture images using discrete Haar transform (DHT) and discrete Fourier transform DFT. Two sets of features are proposed; the first set was extracted using the traditional DFT, while the second used DHT. The features from the Fourier domain are calculated using the radial distribution of spectra, while for those extracted from Haar Wavelet the statistical
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreIn this study the Fourier Transform Infrared Spectrophotometry (FTIR) provides a quick, efficient and relatively inexpensive method for identifying and quantifying gypsum concentrations in the samples taken from different sites from different localities from Alexandria district southwest Baghdad. A comprehensive spectroscopic study of gypsum-calcite system was reported to give good results for the first time by using IR for analytical grades of gypsum (CaSO4.2H2O) and calcite (CaCO3) pure crystals. The spectral results were used to create a calibration curve relates the two minerals concentrations to the intensity (peaks) of FTIR absorbance and applies this calibration to specify gypsum and calcite concentrations in Iraqi gypsiferous soi
... Show MoreIn this study the Fourier Transform Infrared Spectrophotometry (FTIR) provides a quick, efficient and relatively inexpensive method for identifying and quantifying gypsum concentrations in the samples taken from different sites from different localities from Alexandria district southwest Baghdad. A comprehensive spectroscopic study of gypsum-calcite system was reported to give good results for the first time by using IR for analytical grades of gypsum (CaSO4.2H2O) and calcite (CaCO3) pure crystals. The spectral results were used to create a calibration curve relates the two minerals concentrations to the intensity (peaks) of FTIR absorbance and applies this calibration to specify gypsum and calcite concentrations in Iraqi gypsife
... Show MoreIn this study the Fourier Transform Infrared Spectrophotometry (FTIR) provides a quick, efficient and relatively inexpensive method for identifying and quantifying gypsum concentrations in the samples taken from different sites from different localities from Alexandria district southwest Baghdad. A comprehensive spectroscopic study of gypsum-calcite system was reported to give good results for the first time by using IR for analytical grades of gypsum (CaSO4.2H2O) and calcite (CaCO3) pure crystals. The spectral results were used to create a calibration curve relates the two minerals concentrations to the intensity (peaks) of FTIR absorbance and applies this calibration to specify gypsum and calcite concentrations in Iraqi gypsiferous soi
... Show MoreThis article presents a polynomial-based image compression scheme, which consists of using the color model (YUV) to represent color contents and using two-dimensional polynomial coding (first-order) with variable block size according to correlation between neighbor pixels. The residual part of the polynomial for all bands is analyzed into two parts, most important (big) part, and least important (small) parts. Due to the significant subjective importance of the big group; lossless compression (based on Run-Length spatial coding) is used to represent it. Furthermore, a lossy compression system scheme is utilized to approximately represent the small group; it is based on an error-limited adaptive coding system and using the transform codin
... Show MoreThis article aims to estimate the partially linear model by using two methods, which are the Wavelet and Kernel Smoothers. Simulation experiments are used to study the small sample behavior depending on different functions, sample sizes, and variances. Results explained that the wavelet smoother is the best depending on the mean average squares error criterion for all cases that used.
This work discusses the beginning of fractional calculus and how the Sumudu and Elzaki transforms are applied to fractional derivatives. This approach combines a double Sumudu-Elzaki transform strategy to discover analytic solutions to space-time fractional partial differential equations in Mittag-Leffler functions subject to initial and boundary conditions. Where this method gets closer and closer to the correct answer, and the technique's efficacy is demonstrated using numerical examples performed with Matlab R2015a.
Future wireless communication systems must be able to accommodate a large number of users and simultaneously to provide the high data rates at the required quality of service. In this paper a method is proposed to perform the N-Discrete Hartley Transform (N-DHT) mapper, which are equivalent to 4-Quadrature Amplitude Modulation (QAM), 16-QAM, 64-QAM, 256-QAM, … etc. in spectral efficiency. The N-DHT mapper is chosen in the Multi Carrier Code Division Multiple Access (MC-CDMA) structure to serve as a data mapper instead of the conventional data mapping techniques like QPSK and QAM schemes. The proposed system is simulated using MATLAB and compared with conventional MC-CDMA for Additive White Gaussian Noise, flat, and multi-path selective fa
... Show More