Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.
This deals with estimation of Reliability function and one shape parameter (?) of two- parameters Burr – XII , when ?(shape parameter is known) (?=0.5,1,1.5) and also the initial values of (?=1), while different sample shze n= 10, 20, 30, 50) bare used. The results depend on empirical study through simulation experiments are applied to compare the four methods of estimation, as well as computing the reliability function . The results of Mean square error indicates that Jacknif estimator is better than other three estimators , for all sample size and parameter values
The numerical resolve nonlinear system of Volterra integral equation of the second kind (NLSVIEK2) has been considered. The exponential function is used as the base function of the collocation method to approximate the resolve of the problem. Arithmetic epitome are performed which have already been solved by weighted residual manner, Taylor manner and block- by- block(2, 3, 5).
يعد هذا النص أحد النصوص المسمارية المصادرة التي بحوزة المتحف العراقي، ويحمل الرقم المتحفي (235869)، قياساته )12،7x 6x 2،5سم). يتضمن مدخولات كميات من الشعير،أرخ النص الى عصر أور الثالثة (2012-2004 ق.م) و يعود الى السنة الثالثة من حكم الملك أبي-سين (2028-2004 ق.م)،أن الشخصية الرئيسة في هذا النص هو)با-اَ-كا مسمن الماشية( من مدينة أري-ساكرك، ومقارنته مع النصوص المسمارية المنشورة التي تعود الى أرشيفه يبلغ عددها (196) نصاً تضمنت نشاطاته م
... Show MoreABSTRACT Background: Color changes that are detectable to human eye can affect the esthetic appearance of ceramic veneers. The purpose of this study was to evaluate and compare the effect of artificial accelerated aging on the color of ceramic veneers cemented with different resin cements. Materials and Methods: Sixty discs were prepared with 0.5 mm thickness, 30 discs made from IPS e.max press (Ivoclar Vivadent) and 30 discs were made from VITA Enamic (VITA Zahnfabrik). The discs were cemented with three resin cements: Variolink Veneer MV 0 shade (Ivoclar Vivadent), Rely X veneer Translucent shade (3M ESPE) and NX3 Nexus Clear shade (Kerr Corporation) with 0.1 mm thickness. The spectrophotometer Easyshade Advance was used to measure the co
... Show MoreIn this paper two ranking functions are employed to treat the fuzzy multiple objective (FMO) programming model, then using two kinds of membership function, the first one is trapezoidal fuzzy (TF) ordinary membership function, the second one is trapezoidal fuzzy weighted membership function. When the objective function is fuzzy, then should transform and shrinkage the fuzzy model to traditional model, finally solving these models to know which one is better
The lowest layer of the atmosphere is called the atmospheric mixed layer, characterized by small-scale, irregular air motions defined by winds that change in speed and direction. Aerosol radiative effects impact the atmospheric boundary layer (ABL), which holds most aerosols in the lower atmosphere. Aerosol absorption and scattering both lower the quantity of solar energy that reaches the ground, which has an impact on the spectral signature of the land coverings. In this study, 51 locations in downtown Baghdad were chosen for four different types of land cover (water bodies, farms, open areas, and residential areas) for Sentinel 2 satellite imagery, and the time the pictures were taken was 8:00 am ( 22 March, 22 June, 20 September,
... Show MoreThe standard formulation of Wave Intensity Analysis (WIA) assumes that the flow velocity (U) in the conduit is <;<; the velocity of propagation of waves (c) in the system, and Mach number, M=U/c, is negligible. However, in the large conduit arteries, U is relatively high due to ventricular contraction and c is relatively low due to the large compliance; thus M is > 0, and may not be ignored. Therefore, the aim of this study is to identify experimentally the relationship between M and the reflection coefficient in vitro. Combinations of flexible tubes, of 2 m in length with isotropic and uniform circular cross sectional area along their longitudinal axes, were used to present mother and daughter tubes to produce a range of reflection coeffic
... Show MoreThe existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is
... Show More