An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Signal to Noise Ratio is about 55dB. The recovered secret image is extracted (100%) if stego-image has no attack. These methods can provide good hiding capacity and image quality. Several types of attacks have been applied to the proposed methods in order to measure the robustness like (compression, add noise and cropping). The proposed algorithm has been implemented by using computer simulation program MATLAB version 7.9 under windows 7 operating system by Microsoft cooperation.
The yellow scale insect
In a report by Transparency Organization in 2010, Iraq has 200 newspapers, magazines, sixty-seven radio stations and 45 satellite TV channels. The increase in these figures is measured in days or weeks and not months and years. This fact confirms the importance of studying content providers, especially youth sports content, for two reasons: the first is that young people constitute the highest percentage in Iraqi society, with all the potential involved in shaping the future aspects; the second reason is that for years sport has become an important pillar in people's lives not only in the entertainment aspect as it was seen in the past; Rather, sport has an influential presence in politi
... Show MoreIn this study, the researcher aims to analyze the content of the physics textbook for the 3rd intermediate grade according to the criteria for designing and producing infographics, and the research community consists of the content of the physics textbook for the 3rd intermediate grade intermediate grade for the academic year 2021-2022. The researcher adopted the analysis instruments with a number of the criteria for designing and producing infographics. The results revealed randomness in the percentage of the criteria included in the content of the physics textbook for the 3rd intermediate grade, and they are not compatible with the proposed criteria by the experts also.
The research was carried out in lathhouse on one-year-old apple seedlings of the Ibrahimi variety in the Karma-Fallujah region for the 2021 growing season to study the effect of methods of adding nano-fertilizer and humic acid on seedling growth. A two-factor experiment was designed according to a randomized complete block design, with three replicates and two seedlings per experimental unit, so the number of seedlings was 54. The first factor includes NPK nanofertilizer at three levels (0- and 2-ml L-1 foliar spray and 5 ml L-1 soil application). The second factor is humic acid at three levels (0 and 5 g of seedlings - 1 foliar spray and 10 g of seedlings - 1 soil application). The results of the study show that the NPK nano-fertil
... Show MoreA field experiment was carried out during two winter season 2013, 2014 at the field of the Department of Field Crops, College of Agriculture, University of Baghdad, to study the effect of seeds soaking with Gibberellic acid and foliar with Abscisic Acid on the growth, yield, and content of Anise oil seeds using factorial experiment within RCBD design with three replicates. The seeds was treated within GA3 were soaked with two concentrations of 30, and 60 mg. litter-1 in addition to without soaking and the code has been B0 , B1 , B2 overlapped these transactions with two concentrations of Abscisic Acid 3, and 6 mg. litter-1 in addition to without foliar A0 , A1 , A2The seeds to be treated with GA3 are soaked for 24 hours prior
... Show MoreMilling process is a common machining operation that is used in the manufacturing of complex surfaces. Machining-induced residual stresses (RS) have a great impact on the performance of machined components and the surface quality in face milling operations with parameter cutting. The properties of engineering material as well as structural components, specifically fatigue life, deformation, impact resistance, corrosion resistance, and brittle fracture, can all be significantly influenced by residual stresses. Accordingly, controlling the distribution of residual stresses is indeed important to protect the piece and avoid failure. Most of the previous works inspected the material properties, tool parameters, or cutting parameters, bu
... Show MoreAchieving reliable operation under the influence of deep-submicrometer noise sources including crosstalk noise at low voltage operation is a major challenge for network on chip links. In this paper, we propose a coding scheme that simultaneously addresses crosstalk effects on signal delay and detects up to seven random errors through wire duplication and simple parity checks calculated over the rows and columns of the two-dimensional data. This high error detection capability enables the reduction of operating voltage on the wire leading to energy saving. The results show that the proposed scheme reduces the energy consumption up to 53% as compared to other schemes at iso-reliability performance despite the increase in the overhead number o
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreCredit risk assessment has become an important topic in financial risk administration. Fuzzy clustering analysis has been applied in credit scoring. Gustafson-Kessel (GK) algorithm has been utilised to cluster creditworthy customers as against non-creditworthy ones. A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. Utilising similar degree between points to get similarity density, and then by means of maximum density points selecting; the modified Kohonen Network method generate clustering initial centres to get more reasonable clustering res
... Show More