In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .
Aim: The purpose of this study was to analyze the patterns of facial fractures in children and to compare them between preschool- and school-aged children. Materials and methods: This retrospective observational study included 57 children with facial fractures. The variables analyzed were the age of the patients—divided into a preschool-aged group (0–5 years) and a school-aged group (6–12 years)—gender, cause of trauma, the facial bones involved, the pattern of fracture, the modality of treatment used, the time between injury and treatment, and the postoperative complications. Results: The incidence of facial fractures in children ≤12 years was 30.2%. The patients consisted of 40 (70.2%) males and 17 (29.8%) females, and most pati
... Show MoreThe analysis of the hyperlink structure of the web has led to significant improvements in web information retrieval. This survey study evaluates and analyzes relevant research publications on link analysis in web information retrieval utilizing diverse methods. These factors include the research year, the aims of the research article, the algorithms utilized to complete their study, and the findings received after using the algorithms. The findings revealed that Page Rank, Weighted Page Rank, and Weighted Page Content Rank are extensively employed by academics to properly analyze hyperlinks in web information retrieval. Finally, this paper analyzes the previous studies.
Infrastructure projects take a long time, are complex, multidisciplinary, use different materials and products, and have high risk. These characteristics affect the process of supplying materials. The current paper studies the ability to improve the supply chain process and decrease its cost by identifying the factors that affect it. These factors are used as variables in the mathematical model, which is working under uncertain conditions when the consumption rate of materials is not constant. The information used in this model is obtained from Building Information Modeling (BIM) and Geographical Information System (GIS) techniques and the genetic algorithm is utilized to determine the optimal supplier and the quantities of supplies
... Show MoreA lack of adequate building maintenance is a significant obstacle faced by governmental hospitals. This paper evaluates factors that negatively impact building-maintenance practices in Iraq. A literature review was conducted to identify factors affecting maintenance. A list of 42 factors affecting hospital-buildings was collected from previous studies and tested using a structured questionnaire distributed to hospital-maintenance experts. During the data analysis, 76 valid questionnaires were used. Based on the respondents’ ratings, the relative-importance index (RII) was used to determine the level of importance of each factor. From the results, it was concluded that twelve factors affect maintenance practices in hospital buildin
... Show MoreFlooding hazard is an important and dangerous natural phenomenon that leads to significant material losses. It should be studied and scenario to prevent significant losses. The studies should consider the impact of many factors such as human, infrastructure, economic,..etc. The main objective of the research is the risk management procedure. The study was conducted in Baghdad, Iraq. The materials for completing this research were prepared by gathering a satellite image and Digital Elevation Model (DEM) via the USGS website, then processed, analyzed, and converted into a different flood region concerning the probability of rising water levels where the normal height of Baghdad city is 28m over sea level. This scenario defines 3m,
... Show MoreR. Vasuki [1] proved fixed point theorems for expansive mappings in Menger spaces. R. Gujetiya and et al [2] presented an extension of the main result of Vasuki, for four expansive mappings in Menger space. In this article, an important lemma is given to prove that the iteration sequence is Cauchy under suitable condition in Menger probabilistic G-metric space (shortly, MPGM-space). And then, used to obtain three common fixed point theorems for expansive type mappings.
<p>In this paper, we prove there exists a coupled fixed point for a set- valued contraction mapping defined on X× X , where X is incomplete ordered G-metric. Also, we prove the existence of a unique fixed point for single valued mapping with respect to implicit condition defined on a complete G- metric.</p>
Fracture pressure gradient prediction is complementary in well design and it is must be considered in selecting the safe mud weight, cement design, and determine the optimal casing seat to minimize the common drilling problems. The exact fracture pressure gradient value obtained from tests on the well while drilling such as leak-off test, formation integrity test, cement squeeze ... etc.; however, to minimize the total cost of drilling, there are several methods could be used to calculate fracture pressure gradient classified into two groups: the first one depend on Poisson’s ratio of the rocks and the second is fully empirical methods. In this research, the methods selected are Huubert and willis, Cesaroni I, Cesaroni II,
... Show More