In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .
In this research, the geotechnical properties of the soil profile in Hilla city within Babylon Governorate in the middle parts of Iraq are described. The geotechnical data at the specific sites were collected from some geotechnical investigation reports performed at some selected locations. This article is devoted to studying the distribution of soil properties (the physical and mechanical) in the horizontal and vertical directions. Moreover, a correlation between different physical and mechanical properties is performed. The correlation is executed using statistical analysis by Microsoft Excel Software (2016). From the regression results, it was found that the nature of the soil is c
Collective C2 transitions in 32S are discussed for higher
energy configurations by comparing the calculations of transition
strength B(CJ )with the experimental data. These configurations
are taken into account through a microscopic theory including
excitations from the core orbits and the model space orbits with nħω
excitations.
Excitations up to n=10 are considered. However n=6 seems to
be large enough for a sufficient convergence. The calculations
include the lowest seven 2+0 states of 32S.
Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreIn this paper, simulation study of the frequency shift of photonic bandgaps due to refractive index scaling using liquids filled hollow-core photonic crystal fibers is presented. Different liquids (distilled water, n-hexane, methanol, ethanol and acetone) are used to fill the cladding of 2 types of hollow core photonic crystal fibers (HC19-1060, HC7-1060). These liquids are used to change the effective index scaling and index contrast of the cladding. The effect of increasing temperature of the liquid (20-100 0C for water and 20-70 0C for other liquids ) infiltrated hollow core fiber on the bandgap width and transmission properties has been computed. The maximum photonic bandgap width at 0.0243 has appeared with filling HC7-1060 PCF with
... Show MoreThe energy expectation values for Li and Li-like ions ( , and ) have been calculated and examined within the ground state and the excited state in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wave functions.
يشكل السياق جانبا مهماً في فهم الخطاب والمقصود هنا العرض المسرحي، من خلال ما يمده السياق للمتلقي من مؤشرات، يتم الاعتماد عليها في استكمال المعنى الظاهر بالمعنى المستتر، فالسياق يعتمد في الاصل على المحيط المادي الاجتماعي الذي يتم فيه التواصل وفيه يتعرف المرسل والمتلقي أحدهما على الآخر وتتبلور الصورة التي يحملها الطرفان أحدهما عن الآخر، الى جانب كونه يمثل الاحداث التي سبق لهما أن عاشاها والتبادل القولي
... Show MoreTransference numbers of the aqueous zinc chloride and zinc sulphate solutions have been measured for the concentrations 0.03, 0.05, 0.07, 0.09 and 0.1 mol.dm-3at 298.15K, by using the modified Hittorf method. The dependence of transference number on concentration of each electrolyte was also investigated in an attempt to explain the value of the limiting transference number. The Longsworth method has been used for the extrapolation of zinc transference number in aqueous solutions, using the values of the limiting transference numbers of the appropriate values of the limiting equivalent conductance, it was possible to determine the corresponding values of the limiting ion conductance for the cations and anions of the electrolytes. The
... Show MoreIn this work we reported the synchronization delay in
semiconductor laser (SL) networks. The unidirectional
configurations between successive oscillators and the correlation
between them are achieved. The coupling strength is a control
parameter so when we increase coupling strength the dynamic of the
system has been change. In addition the time required to synchronize
network components (delay of synchronization) has been studied as
well. The synchronization delay has been increased by mean of
increasing the number of oscillators. Finally, explanation of the time
required to synchronize oscillators in the network at different
coupling strengths.
The purpose of this paper is to statistically classify and categorize Building Information Modelling (BIM)-Facility Management (FM) publications in order to extract useful information related to the adoption and use of BIM in FM.
This study employs a quantitative approach using science mapping techniques to examine BIM-FM publications using Web of Science (WOS) database for the period between 2000 and April 2018.
The findi