The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current techniques have not been successful in attaining more improved security caused by the non-encrypted data that only underwent the first layer of concealment through merely a straightforward embedment process of the secret data within the images, thus allowing the extraction of the concealed data to be quite simple for hostile entities. Hence, in the current study, the proposed scheme, we have improved the Bit Inverting Map method to narrow the gap of existing work. Our experimental results indicate that the proposed framework maintains a better balance between image visual quality and security, with relatively less computational and complexity, which assures its effectiveness compared to other state-of-the-art methods.
The aim of this paper is to present the numerical method for solving linear system of Fredholm integral equations, based on the Haar wavelet approach. Many test problems, for which the exact solution is known, are considered. Compare the results of suggested method with the results of another method (Trapezoidal method). Algorithm and program is written by Matlab vergion 7.
Synthesis of sedimentologic, paleocurrent, and organic geochemistry data of the Lower Permian Ga’ara Formation from the Western Desert, western Iraq, shows good hydrocarbon potentiality and deposition by high sinuosity and mixed-load channels, likely by a meandering river system. The Ga’ara Formation includes kaolinitic mudstone beds of various colors and channelized quartzitic sandstone beds. Based on the lithofacies identification, five lithofacies associations have been recognized: channel-floor, point-bar, abandoned channel plug, crevasse splay, and interchannel flood basin. In addition, the paleocurrent analysis and sandstone percentage map indicate a variation of the paleoflow spatially and temporally with a general di
... Show MoreThe current study primarily aims to develop a dictionary system for tracing mobile phone numbers for call centers of mobile communication companies. This system tries to save the numbers using a digital search tree in order to make the processes of searching and retrieving customers’ information easier and faster. Several shrubs that represent digits of the total phone numbers will be built through following the phone number digits to be added to the dictionary, with the owner name being at the last node in the tree. Thus, by such searching process, every phone number can be tracked digit-by-digit according to a required path inside its tree, until reaching the leaf. Then, the value stored in the node, that rep
... Show MoreIn recent years it has spread the used of e-commerce sites quite dramatically. Thus, these sites have become display huge number of diverse products. It became difficulty for the customer to choose what he/she wants from this product. The recommender systems are used to help customers to finding the desired product of their interests and proved to be an important solution to information overload problem.
This paper, designed a recommendation system based on content, which is usually textual description. Furthermore, the proposed system uses cosine similarity function to find the similarities among the characteristics of various products, and nominate a suitable product closer to customer satisfaction. The experimental result shows tha
The aims of the paper are to present a modified symmetric fuzzy approach to find the best workable compromise solution for quadratic fractional programming problems (QFPP) with fuzzy crisp in both the objective functions and the constraints. We introduced a modified symmetric fuzzy by proposing a procedure, that starts first by converting the quadratic fractional programming problems that exist in the objective functions to crisp numbers and then converts the linear function that exists in the constraints to crisp numbers. After that, we applied the fuzzy approach to determine the optimal solution for our quadratic fractional programming problem which is supported theoretically and practically. The computer application for the algo
... Show MoreThe rising prevalence of obesity-related glomerulopathy (ORG) occurs in accordance with the rising prevalence of obesity worldwide. Clinically ORG is manifested by slowly progressing microalbuminuria that may develop to clinically evident proteinuria. Pathological characteristics of ORG include glomerular hypertrophy in the presence or absence of focal segmental glomerulosclerosis (FSGS). ORG can develop into clinically overt chronic renal insufficiency or even end-stage kidney disease. This article reviews the most important mechanisms for the development of ORG; that are abnormal renal hemodynamics, stimulation of renin-angiotensin-aldosterone system (RAAS), impairment of insulin sensetivity, ectopic lipid deposition, adipose tissue cy
... Show MoreIn this research, Haar wavelets method has been utilized to approximate a numerical solution for Linear state space systems. The solution technique is used Haar wavelet functions and Haar wavelet operational matrix with the operation to transform the state space system into a system of linear algebraic equations which can be resolved by MATLAB over an interval from 0 to . The exactness of the state variables can be enhanced by increasing the Haar wavelet resolution. The method has been applied for different examples and the simulation results have been illustrated in graphics and compared with the exact solution.
Background: Primary Health care (PHC) is unanimous to be the cornerstone of a person-centered health system. While the adoption of a well-function, two-way, and organized referral system is the mainstay in the development of an efficient healthcare delivery system.
Objective: To Assess the practice & opinion of doctors in the hospitals toward the referral system. to determine the doctors in the hospital's commitment to referral system instructions and guidelines.
Subjects and Methods: A cross-sectional study with analytic elements was conducted in nine Iraqi governorates. Eight doctors from each health directorate, resulting in a tot
... Show MoreResearch in the field of biometric simulation is in the design of various and various industrial products, but it still needs new studies and research that are compatible with scientific and technological development, especially in the field of computing. Recognition, deduction, and simulation of nature, for example, the use of animal bones as tools in cutting, hunting or fighting, in addition to the use of animal drawings in cave drawings as symbols of strength, as well as dance movements and face painting to simulate the natural reality that surrounds humans. This trend developed to include simulation of nature in the formal and functional aspect to reach To vocabulary and solutions that help man in his daily life, the research probl
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show More