Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
The present study include a new developed method of analysis for determination of drug Spironolaction (SP) in some Pharmaceuticals by Spectrofluorometric method. Spironolaction was determined under optimal experimental condition that follows :- The excitation spectrum was (l=351 nm), the emmetion spectrum was (l=518 nm), pH=1, the suitable temperature for reaction 60oC and the optimal time less than (3) minute. The analysis and rang statistical data was:-Linear dynamic rang (1-10) ?g.ml-1, the detection limit (D.L = 0.023 ?g.ml-1), Molar absorptivity (? = 29875 liter mole-1 cm-1), Relative standard deviation (%RSD = 0.78), (%Erel = 3.3) and recovery (Rec = 96.6) percentage. Determination of Spironolactone was accomplished by two methods
... Show MoreThis research is concerned with the re-analysis of optical data (the imaginary part of the dielectric function as a function of photon energy E) of a-Si:H films prepared by Jackson et al. and Ferlauto et al. through using nonlinear regression fitting we estimated the optical energy gap and the deviation from the Tauc model by considering the parameter of energy photon-dependence of the momentum matrix element of the p as a free parameter by assuming that density of states distribution to be a square root function. It is observed for films prepared by Jackson et al. that the value of the parameter p for the photon energy range is is close to the value assumed by the Cody model and the optical gap energy is which is also close to the value
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (
... Show MoreAfter the year 2003 terrorist attacks knock Baghdad city capital of Iraq using bomb explosion various, shook the nation, and made public resident of Baghdad aware of the need for better ways to protect occupants, assets, and buildings cause the terrorist gangs adopt style burst of blast to injury vulnerability a wider range form, and many structures will suffer damage from air blast when the overpressure concomitant the blast wave, (i.e., the excess over the atmospheric pressure 14.7 pounds per square inch at standard sea level conditions are about one-half pound per square inch or more(
to attainment injury. Then, the distance to which this overpressure level will extend depends primarily on the energy yield (§1.20) of the burst of
Background: Because of wide use of Functional Endoscopic Sinus Surgery (FESS) technique in the recent years and basic role of coronal computed tomography (CT) scan in demonstrating the normal drainage route of para-nasal sinuses, identifying the major patterns of inflammatory sinonasal disease and accompanied anatomical variations is essential for appropriate preoperative surgical planning. In review of publisthed literature, there is no data on CT patterns of chronic inflammatory sinonasal disease and their accompained anatomical variations of nose and PNS in our local population.Objectives: was to determine the frequency of CT patterns and variations in patients with sinonasal symptoms.Methods: This was a cross sectional descriptive st
... Show MoreBackground: In capturing a negative image, the digital impression secures a digital record for the purposeof designing and creating restorations. The introduction of scanning system presents a paradigm shift in the way of the dental impression procedure and encourages the accuracy of obtained restoration especially in the marginal area as a result of producing accurate final impression The digital system offers many advantages over the Conventional method.. The objective of this present in vitro study was to evaluate the marginal fitness of all ceramic crowns fabricated by direct digital scanning of the prepared tooth using two types of intra-oral cameras (Bluecam camera with strip light projection technique and Omnicam camera with video sa
... Show MoreThe survey showed sample opinions of officials in the general company for vegetable oils industry, and the statement of the order of the effect of these dimensions depending on the degree of importance, the questionnaire was used as a key tool in collecting data and information of the sample consisted of 30 officials, arithmetic mean, standard deviation, percentages, Spearman correlation coefficient and the global statistical analysis as a statistical methods that based on statistical program (SPSS), The researcher came to several conclusions, most important that there is high agreement by the respondents of the importance of the dimensions of building a mental picture of the company and to attract the consumer's attention, Also research
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More