The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covered image pixel (after text hiding) was perfectly match the original image pixels through the use of well-known quantify error metrics like rote mean square MSE and signal to noise ratio PSNR measurements. The experimental results are showed in table for various text sizes to the same cover image. Two digital images types (i.e., low and high details) were used in system evaluation.
An update of our research is the first to develop and reform the agricultural sector . and promoting production and productivity of this sector multi-sources , which is the management and beekeeping one source . Been applied to the style of beekeeping mobile promiscuous includes twentieth cell in the Iraqe project of mussiab . in which there exist a variety of crops and trees .
Experiment had proved successful and led to raise the level of npoduction of single Dell of the honey to 49 kg over the previous year and surpassed the average production percell in the province of Babylon , which the amount of 13.945 kg , another
... Show MoreThe aim of this paper is to present the numerical method for solving linear system of Fredholm integral equations, based on the Haar wavelet approach. Many test problems, for which the exact solution is known, are considered. Compare the results of suggested method with the results of another method (Trapezoidal method). Algorithm and program is written by Matlab vergion 7.
In this research velocity of moving airplane from its recorded digital sound is introduced. The data of sound file is sliced into several frames using overlapping partitions. Then the array of each frame is transformed from time domain to frequency domain using Fourier Transform (FT). To determine the characteristic frequency of the sound, a moving window mechanics is used, the size of that window is made linearly proportional with the value of the tracked frequency. This proportionality is due to the existing linear relationship between the frequency and its Doppler shift. An algorithm was introduced to select the characteristic frequencies, this algorithm allocates the frequencies which satisfy the Doppler relation, beside that the tra
... Show MoreThis paper presents new modification of HPM to solve system of 3 rd order PDEs with initial condition, for finding suitable accurate solutions in a wider domain.
By using governing differential equation and the Rayleigh-Ritz method of minimizing the total potential energy of a thermoelastic structural system of isotropic thermoelastic thin plates, thermal buckling equations were established for rectangular plate with different fixing edge conditions and with different aspect ratio. The strain energy stored in a plate element due to bending, mid-plane thermal force and thermal bending was obtained. Three types of thermal distribution have been considered these are: uniform temperature, linear distribution and non-linear thermal distribution across thickness. It is observed that the buckling strength enhanced considerably by additional clamping of edges. Also, the thermal buckling temperatures and
... Show MoreIn this paper, an estimate has been made for parameters and the reliability function for Transmuted power function (TPF) distribution through using some estimation methods as proposed new technique for white, percentile, least square, weighted least square and modification moment methods. A simulation was used to generate random data that follow the (TPF) distribution on three experiments (E1 , E2 , E3) of the real values of the parameters, and with sample size (n=10,25,50 and 100) and iteration samples (N=1000), and taking reliability times (0< t < 0) . Comparisons have been made between the obtained results from the estimators using mean square error (MSE). The results showed the
... Show MoreThe research involves preparing gold nanoparticles (AuNPs) and studying the factors that influence the shape, sizes and distribution ratio of the prepared particles according to Turkevich method. These factors include (reaction temperature, initial heating, concentration of gold ions, concentration and quantity of added citrate, reaction time and order of reactant addition). Gold nanoparticles prepared were characterized by the following measurements: UV-Visible spectroscopy, X-ray diffraction and scanning electron microscopy. The average size of gold nanoparticles was formed in the range (20 -35) nm. The amount of added citrate was changed and studied. In addition, the concentration of added gold ions was changed and the calibration cur
... Show More