In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original image .
A numerical study has been carried out to investigate heat transfer by natural convection and radiation under the effect of magnetohydrodynamic (MHD) for steady state axisymmetric twodimensional laminar flow in a vertical cylindrical channel filled with saturated porous media. Heat is generated uniformly along the center of the channel with its vertical surface remain with cooled constant wall temperature and insulated horizontal top and bottom surfaces. The governing equations which used are continuity, momentum and energy equations which are transformed to dimensionless equations. The finite difference approach is used to obtain all the computational results using the MATLAB-7 programming. The parameters affected on the system are Rayl
... Show MoreThe logistic regression model is one of the oldest and most common of the regression models, and it is known as one of the statistical methods used to describe and estimate the relationship between a dependent random variable and explanatory random variables. Several methods are used to estimate this model, including the bootstrap method, which is one of the estimation methods that depend on the principle of sampling with return, and is represented by a sample reshaping that includes (n) of the elements drawn by randomly returning from (N) from the original data, It is a computational method used to determine the measure of accuracy to estimate the statistics, and for this reason, this method was used to find more accurate estimates. The ma
... Show MoreProved the validity of all mixtures or not to accept the bees and then resistant infection worm wax Minor has accepted honey bee colonies all mixtures beeswax with paraffin wax industrial all ratios used made ??of a mixture to DVD waxy full and used naturally in breeding Houdnth In store honey and pollen evendiversified Bravian and natural wax
Renal function tests are commonly used in clinical practice to look for renal disease, the most common includes the serum urea, uric acid and creatinine. Heart failure patients have a higher incidence of renal function test abnormalities than individuals who do not have heart failure disease. Fifty subjects of adults (male) were divided in to two groups, 25 subjects (healthy) as control (group1) and 25 subjects with heart failure (group 2). Our results indicate that serum uric acid, urea, and creatinine values were significantly elevated (P≤0.05) in patients group (2) compared with healthy group (1). The results also showed, the effect of age categories on uric acid blood urea nitrogen and creatinine values (P≤0.05) and there were no si
... Show MoreThe avoidance of failure in construction projects is not an easy task, which makes the failure of the construction project to achieve its objectives a major problem experienced by all countries in the world, especially Iraq. Where nearly two-thirds of the construction projects in the world have been suffered by significant problems as an increase in the cost of the project, delay in the specified duration for execution, and stopping the project. Therefore it is required to study and apply new methods for managing the construction project to ensure its success and achieve its objectives. The aim of this study is to study the Agile project management method and its impact on the construction project. In addition, to identi
... Show MoreA vector in a separable infinite dimensional Hilbert space is called disk-cyclic for bounded operator if the orbit α : 0, α∈;|∝| 1is dense in. The useful tool used to discover codisk-cyclic operation is called the disk-cyclic Criterion. In this paper we will show that some equivalent conditions of the
Background: Numerous methods have been described for achievement of Intermaxillary fixation in the treatment of fractures of facial skeleton. Conventional methods like Erich arch bars and eyelet wires are currently the most common methods for achieving intermaxillary fixation (IMF), however, they have their own disadvantages. Since 1989, IMF using intraoral self-tapping IMF screws has been introduced for treatment of mandibular fractures. The aim of this study was to evaluate the efficacy, advantages, disadvantages and potential complications associated with using of self-tapping IMF screws in the treatment of mandibular fractures. Material and Methods: Twenty patients with favorable mandibular fractures, attended to Oral and Maxillofacial
... Show MoreThis paper deals with a preliminary survey helminth parasites of the black partridge. Francolinus francolinus arabistanicus in Baghdad area, middle of Iraq. It was found that the bird was infected with the cestodes Cotugnia digonopora and Raillietina tetragona with infection rates of 61.9% and 4.8% respectively, and the nematodes Heterakis gallinarum and Paroneoccrca rouss-lotti with infection rates of 4.8% and 19% respectively. Some important measurements, distribution and occurrence according host-sex of each parasite were provided along with some remarks on parasites biology.