An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Signal to Noise Ratio is about 55dB. The recovered secret image is extracted (100%) if stego-image has no attack. These methods can provide good hiding capacity and image quality. Several types of attacks have been applied to the proposed methods in order to measure the robustness like (compression, add noise and cropping). The proposed algorithm has been implemented by using computer simulation program MATLAB version 7.9 under windows 7 operating system by Microsoft cooperation.
The yellow scale insect
In a report by Transparency Organization in 2010, Iraq has 200 newspapers, magazines, sixty-seven radio stations and 45 satellite TV channels. The increase in these figures is measured in days or weeks and not months and years. This fact confirms the importance of studying content providers, especially youth sports content, for two reasons: the first is that young people constitute the highest percentage in Iraqi society, with all the potential involved in shaping the future aspects; the second reason is that for years sport has become an important pillar in people's lives not only in the entertainment aspect as it was seen in the past; Rather, sport has an influential presence in politi
... Show MoreA field experiment was carried out during two winter season 2013, 2014 at the field of the Department of Field Crops, College of Agriculture, University of Baghdad, to study the effect of seeds soaking with Gibberellic acid and foliar with Abscisic Acid on the growth, yield, and content of Anise oil seeds using factorial experiment within RCBD design with three replicates. The seeds was treated within GA3 were soaked with two concentrations of 30, and 60 mg. litter-1 in addition to without soaking and the code has been B0 , B1 , B2 overlapped these transactions with two concentrations of Abscisic Acid 3, and 6 mg. litter-1 in addition to without foliar A0 , A1 , A2The seeds to be treated with GA3 are soaked for 24 hours prior
... Show MoreThe study aims to indicate the role of strategic financial accounting in the service investors to take appropriate decisions in the future, Through what is provided by the strategic accounting, the future of information and data that enable the investor to make future investment decisions appropriate، If no longer traditional financial accounting putting meet all existing and prospective investors Requirements، That reliance on historical data and information already signed and neglected aspect of future, From this point it was to highlight the role of strategic financial accounting to contribute in this area.
The research aims to determine what a photograph intends to convey as a visual text. Photographs are not captured randomly, especially those of politicians. Each photograph carries a message, even if interpretations of that message vary from person to person. The research adopts a methodology based on semiotic analysis, applying Laurent Gervero's model to analyze a photograph of the Iraqi Prime Minister Mustafa Al-Kadhimi's visit to Fallujah on the anniversary of the victory over ISIS. The photographs in question constitute a visual language built upon a sequence of iconic symbols and signs. These elements coalesce to give rise to an image centered around a particular theme, one designed to convey a precise messag
... Show MoreThe time spent in drilling ahead is usually a significant portion of total well cost. Drilling is an expensive operation including the cost of equipment and material used during the penetration of rock plus crew efforts in order to finish the well without serious problems. Knowing the rate of penetration should help in speculation of the cost and lead to optimize drilling outgoings. Ten wells in the Nasiriya oil field have been selected based on the availability of the data. Dynamic elastic properties of Mishrif formation in the selected wells were determined by using Interactive Petrophysics (IP V3.5) software based on the las files and log record provided. The average rate of penetration and average dynamic elastic propert
... Show MoreCredit risk assessment has become an important topic in financial risk administration. Fuzzy clustering analysis has been applied in credit scoring. Gustafson-Kessel (GK) algorithm has been utilised to cluster creditworthy customers as against non-creditworthy ones. A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. Utilising similar degree between points to get similarity density, and then by means of maximum density points selecting; the modified Kohonen Network method generate clustering initial centres to get more reasonable clustering res
... Show MoreCurrently and under the COVID-19 which is considered as a kind of disaster or even any other natural or manmade disasters, this study was confirmed to be important especially when the society is proceeding to recover and reduce the risks of as possible as injuries. These disasters are leading somehow to paralyze the activities of society as what happened in the period of COVID-19, therefore, more efforts were to be focused for the management of disasters in different ways to reduce their risks such as working from distance or planning solutions digitally and send them to the source of control and hence how most countries overcame this stage of disaster (COVID-19) and collapse. Artificial intelligence should be used when there is no practica
... Show MoreIn the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show More