Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
The effect of internal acoustic excitation on the leading-edge, separated boundary layers and the aerodynamic performance of NACA23015 cross section airfoil are examined as a function of excitation location with ranging frequency range (50-400) Hz of the introduced acoustic. Tests are separately conducted in two sections, open type wind tunnels at the Reynolds number of 3.3x105 for measurement at angle of attack (0, 3, 6, 9 &12) deg. and 3x104 for the visualization at angle of attack (12) deg. based on the airfoil chord. Results indicated that the excitation frequency and the excitation location are the key parameters to alter the flow properties and thus to improve the aerodynamic performance. The most effective excitation frequency
... Show MoreThe growing phenomenon of drug abuse in light of the increasing psychological and social pressures experienced by members of the community of wars and crises of the Iraqi society in the middle of the last decade was Andv societies that are free of the phenomenon of drug addiction, but with a high level events, wars and economic crises and the deterioration of the situation security and lack of control on the border with the neighboring countries, it has become a breeding ground and the focus of drug-smuggling gangs, all of which led to the spread of drug abuse, especially among the youth category, and undoubtedly the seriousness of drug abuse Taatmd negative community impacts, Valmtaati drug becomes a member unproductive and unable to ea
... Show MoreAbu Al- Qasim Qa ,im Maqam is famous figure in political life of lranian; The life of Abu Al- Qasim Qa ,im Maqam is full of incidents and conflicts in the period of the expansion of foreign influence in lran Abu Al- Qasim Qa ,im Maqam has an important role in the history of Iran Modern political considered him one of the most prominent leaders to the unified Arabian nationalistic liberating Abu Al- Qasim Qa ,im Maqam raised in the history of the Qajar .
In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
A LiF (TLD-700) PTFED disc has adiameter of (13mm) and thickness of (0.4mm) for study the response and sensetivity of this material for gamma and beta rays by using (TOLEDO) system from pitman company. In order to calibrate the system and studying the calibration factor. Discs were irradiated for Gamma and Beta rays and comparing with the theoretical doses. The exposure range is between 15×10-2 mGy to 1000×10-2 mGy. These doses are within the range of normal radiation field for workers.