An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Signal to Noise Ratio is about 55dB. The recovered secret image is extracted (100%) if stego-image has no attack. These methods can provide good hiding capacity and image quality. Several types of attacks have been applied to the proposed methods in order to measure the robustness like (compression, add noise and cropping). The proposed algorithm has been implemented by using computer simulation program MATLAB version 7.9 under windows 7 operating system by Microsoft cooperation.
Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of
... Show MoreTheoretical and experimental investigations of the transient heat transfer parameters of constant heat flux source subjected to water flowing in the downward direction in closed channel are conducted. The power increase transient is ensured by step change increase in the heat source power. The theoretical investigation involved a mathematical modeling for axially symmetric, simultaneously developing laminar water flow in a vertical annulus. The mathematical model is based on one dimensional downward flow. The boundary conditions of the studied case are based on adiabatic outer wall, while the inner wall is subjected to a constant heat flux. The heat & mass balance equation derived for specified element of bulk water within the annulu
... Show MoreSequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of cove
... Show MoreIn this paper, a random transistor-transistor logic signal generator and a synchronization circuit are designed and implemented in lab-scale measurement device independent–quantum key distribution systems. The random operation of the weak coherent sources and the system’s synchronization signals were tested by a time to digital convertor.
In recent years and decades, there is a great need for developing new alternative energy sources or renewable sustainable energy. On the other hand, new technology approaches are growing . towards benefits from the valuable nutrients in wastewater which are unrecoverable by traditional wastewater treatment processes. In the current study, a novel integrated system of microbial fuel cell and anoxic bioreactor (MFC-ANB) was designed and constructed to investigate its potential for slaughterhouses wastewater treatment, nitrogen recovery, and power generation. The system consisted of a double-chamber tubular type MFC with biocathode inoculated with freshly collected activated sludge. The MFC-ANB system was continuously fed with real-fi
... Show MoreA general velocity profile for a laminar flow over a flat plate with zero incidence is obtained by employing a new boundary condition to the other available boundary conditions. The general velocity profile is mathematically simple and nearest to the exact solution. Also other related values, boundary layer thickness, displacement thickness, momentum thickness and coefficient of friction are nearest to the exact solution compared with other corresponding values for other researchers.
In this thesis, some sets of subspaces of projective plane PG(2,q) over Galois field GF(q) and the relations between them by some theorems and examples can be shown.
In this work, the relationship between the ionospheric parameters (Maximum Usable Frequency (MUF), Lowest Usable Frequency (LUF) and Optimum working Frequency (OWF)) has been studied for the ionosphere layer over the Iraqi zone. The capital Baghdad (44.42oE, 33.32oN) has been selected to represent the transmitter station and many other cities that spread over Iraqi region have represented as receiver stations. The REC533 communication model considered as one of the modern radio broadcasting version of ITU has been used to calculate the LUF parameter, while the MUF and OWF ionospheric parameters have been generated using ASAPS international communication model which represents one of the most advanced and accurate HF sky wave prop
... Show More The purpose of this work is to study the classification and construction of (k,3)-arcs in the projective plane PG(2,7). We found that there are two (5,3)-arcs, four (6,3)-arcs, six (7,3)arcs, six (8,3)-arcs, seven (9,3)-arcs, six (10,3)-arcs and six (11,3)-arcs. All of these arcs are incomplete. The number of distinct (12,3)-arcs are six, two of them are complete. There are four distinct (13,3)-arcs, two of them are complete and one (14,3)-arc which is incomplete. There exists one complete (15,3)-arc.
KA Hadi, AH Asma’a, IJONS, 2018 - Cited by 1