Concealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary, hide two bits from the message in two bits of the least significant bits of blue sector of the image.
The usage of blue laser has been considered as a therapeutic approach to prohibit the viability of bacterial species, but there is no agreement about optimum parameters to be used. The aim of this project is to study the influence of blue laser (450 nm) on the viability of the gram-negative bacteria Proteus mirabilis isolated from burn wounds, using different exposure times (i.e. doses) in vitro. Seventy swab samples were collected from burn wounds of patients admitted to the burns unit in AL-Yarmouk teaching hospital in Baghdad, during the period from June to August 2019. The Bacteria were isolated and identified depending on their culture characteristics, biochemical tests, gram staining, and morphology, being f
... Show MoreThe aim of this paper is to study the nonlinear delay second order eigenvalue problems which consists of delay ordinary differential equations, in fact one of the expansion methods that is called the least square method which will be developed to solve this kind of problems.
Traditionally, path selection within routing is formulated as a shortest path optimization problem. The objective function for optimization could be any one variety of parameters such as number of hops, delay, cost...etc. The problem of least cost delay constraint routing is studied in this paper since delay constraint is very common requirement of many multimedia applications and cost minimization captures the need to
distribute the network. So an iterative algorithm is proposed in this paper to solve this problem. It is appeared from the results of applying this algorithm that it gave the optimal path (optimal solution) from among multiple feasible paths (feasible solutions).
Background : The hepatopulmonary syndrome (HPS) is defined as the triad of liver disease, arterial deoxygenation, and pulmonary vascular dilatation. The reported prevalence of HPS in cirrhotic patients varies between 5% -17.5%.Objective : To estimate the prevalence of hepatopulmonary syndrome among patients with chronic liver disease and portal hypertension and to study the correlation between HPS and the severity of liver disease.Patients and methods : Thirty patients were studied for the presence of HPS using transthoracic contrast echocardiography for detection of pulmonary vasodilatation. Arterial oxygen saturation (SaO2) was determined in erect and supine position using a pulse oximeter , (SaO2 ≤ 92 % in supine position and/or a d
... Show MoreAbstract
The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test images, and compared with some present methods.
... Show MoreIris detection is considered as challenging image processing task. In this study efficient method was suggested to detect iris and recognition it. This method depending on seed filling algorithm and circular area detection, where the color image converted to gray image, and then the gray image is converted to binary image. The seed filling is applied of the binary image and the position of detected object binary region (ROI) is localized in term of it is center coordinates are radii (i.e., the inner and out radius). To find the localization efficiency of suggested method has been used the coefficient of variation (CV) for radius iris for evaluation. The test results indicated that is suggested method is good for the iris detection.
Discrete logarithms are applied in many cryptographic problems . For instance , in public key . and for construction of sets with disti nct sums of k-clcments. The purpose o r this paper
is to modify the method ol' informationl1·iding using discrete logarithms , introduce new properties of St - sets , uscdthe direct product of groups to construct cyclic group and finally, present modified method for knapsack &
... Show MoreSolar photovoltaic (PV) system has emerged as one of the most promising technology to generate clean energy. In this work, the performance of monocrystalline silicon photovoltaic module is studied through observing the effect of necessary parameters: solar irradiation and ambient temperature. The single diode model with series resistors is selected to find the characterization of current-voltage (I-V) and power-voltage (P-V) curves by determining the values of five parameters ( ). This model shows a high accuracy in modeling the solar PV module under various weather conditions. The modeling is simulated via using MATLAB/Simulink software. The performance of the selected solar PV module is tested experimentally for differ
... Show MoreIraq has the distinction of being a great potential of non-renewable natural resources,
especially crude oil and natural gas. Since the discovery of crude oil at the beginning of the
twentieth century in Iraq. Although the different of investment types, it contributed to the oil
sector in the provision of financial resources to the state treasury , since that date until the
present time.
Search has been marked by division ((The foreign investment in the oil sector in Iraq after
2003)) into three sections. The first section included a brief history of the development of
Iraq's oil potential in terms of oil reserves, and oil fields, and the quantities of production and
export. The second section reviewed the investm