significant bits either in the spatial domain or frequency domain sequentially or pseudo
randomly through the cover media (Based on this fact) statistical Steganalysis use different
techniques to detect the hidden message, A proposed method is suggested of a stenographic
scheme a hidden message is embedded through the second least significant bits in the
frequency domain of the cover media to avoid detection of the hidden message through the
known statistical Steganalysis techniques.
Kriging, a geostatistical technique, has been used for many years to evaluate groundwater quality. The best estimation data for unsampled points were determined by using this method depending on measured variables for an area. The groundwater contaminants assessment worldwide was found through many kriging methods. The present paper shows a review of the most known methods of kriging that were used in estimating and mapping the groundwater quality. Indicator kriging, simple kriging, cokriging, ordinary kriging, disjunctive kriging and lognormal kriging are the most used techniques. In addition, the concept of the disjunctive kriging method was explained in this work to be easily understood.
The aim of this paper is to present a method for solving of system of first order initial value problems of ordinary differential equation by a semi-analytic technique with constructing polynomial solutions for decreasing dangers of lead. The original problem is concerned using two-point osculatory interpolation with the fit equals numbers of derivatives at the end points of an interval [0 , 1].
Background: Cystatin C is recently considered to be a good predictor of cardiovascular morbidity and mortality in patients with coronary artery disease (CAD)Objectives: Correlation between cystatin and ischemic heart disease.Methods :One hundred forty patients (140) with ischemic heart disease admitted to thin study at Baghdad teaching hospital from the period June. 2011 to Jan. 2012. Those patients was categorized into three groups.Group (A): patients with ischemic heart failure.Group (B): Patients with myocardial infarction.Group (C) patients with unstable angina.All these groups were in comparison to fifty (50) healthy controls. Fasting serum citation (C) were measured in all patients and control in addition to all other routine inves
... Show MoreThis research include the designation of newly instrument (Turbidmeter) depending on using photo voltaic detector (8.5mm.*8.5mm.).These dimensions have large area which increases the scattering rays with a variable intensity. The properties of this design are local mode and the used tools are a available in the local markets as well as its less cost light weight system. It is worth mentioning that the possibility of its application in many fields such as: Clinical, Laboratory, Industrial and Fuel fields. This designation, applied to estimate Barium Sulphate in turbidity method. The analytical results show high accuracy and repetition, also the linearity ranges from (4-180) ppm. At the detection limit (0.05) ppm. With correlation coefficient
... Show MoreIt is well known that sonography is not the first choice in detecting early breast tumors. Improving the resolution of breast sonographic image is the goal of many workers to make sonography a first choice examination as it is safe and easy procedure as well as cost effective. In this study, infrared light exposure of breast prior to ultrasound examination was implemented to see its effect on resolution of sonographic image. Results showed that significant improvement was obtained in 60% of cases.
The traditional voice call over Global System for Mobile Communications (GSM) and Public Switched Telephone Network (PSTN) is expensive and does not provide a secure end to end voice transmission. However, the growth in telecommunication industry has offered a new way to transmit voice over public network such as internet in a cheap and more flexible way. Due to insecure nature of the public network, the voice call becomes vulnerable to attacks such as eavesdropping and call hijacking. Accordingly, protection of voice call from illegal listening becomes increasingly important.
To this end, an android-based application (named E2ESeVoice application) to transmit voice in a secure way between the end users is proposed based on modified R
Community peace is achieved in law-based states Constitutional institutions with competence and powers, and otherwise that peace is shaken and begins to collapse. The movement of individuals and groups in the State is regulated by law The law and its proper application without selectivity or exception, and then the sense of equal opportunity and equal rights grows every citizen looks at his spouse, what he has, and when he is unbalanced, a sense of frustration and stealing of rights is generated Societal peace suffers from the shocks of instability and what is reflected in the surrounding environment. Instead of production, demolition takes place, which impedes the achievement of the required peace.
... Show MoreIn this paper two ranking functions are employed to treat the fuzzy multiple objective (FMO) programming model, then using two kinds of membership function, the first one is trapezoidal fuzzy (TF) ordinary membership function, the second one is trapezoidal fuzzy weighted membership function. When the objective function is fuzzy, then should transform and shrinkage the fuzzy model to traditional model, finally solving these models to know which one is better
This research is an initial attempt to explore the reality of reform and its concept in Islam, and to describe the presence of educational practices in the Arab-Islamic heritage. The importance of this research lies in addressing a number of important issues related to the contemporary Islamic reform system. The research showed the need for authentic educational reform values that draw their reference from the origins of Islam. The research also emphasized the analysis of the reality of education in the Muslim world and the identification of its problems and the search for solutions through a quick and comprehensive look at the diverse contributions of Muslim thinkers to Islamic educational reform thought, and their active role in addressin
... Show More