The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covered image pixel (after text hiding) was perfectly match the original image pixels through the use of well-known quantify error metrics like rote mean square MSE and signal to noise ratio PSNR measurements. The experimental results are showed in table for various text sizes to the same cover image. Two digital images types (i.e., low and high details) were used in system evaluation.
In the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show MoreThe security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show Moreتعد مجالات الصورة وعلاماتها الحركية حضوراً دلالياً للاتصال العلامي واتساعاً في الرابطة الجدلية ما بين الدوال ومداليها، التي تقوم بها الرؤية الاخراجية لإنتاج دلالات اخفائية تمتلك جوهرها الانتقالي عبر الافكار بوصفها معطيات العرض، ويسعى التشفير الصوري الى بث ثنائية المعنى داخل الحقول المتعددة للعرض المسرحي، ولفهم المعنى المنبثق من هذه التشفيرات البصرية، تولدت الحاجة لبحث تشكيل هذه التشفيرات وكيفية تح
... Show MoreJPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.
Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no
... Show MoreThe aim of present study is to determine the optimum parameters of friction stir welding process and known the most important parameter along with percentage contribution of each parameter which effect on tensile strength and joint efficiency of FS welded joint of dissimilar aluminum alloys AA2024-T3 and AA7075-T73 of 3 mm thick plates by applied specific number of experiments using Taguchi method .AA2024 was placed on the advancing side and AA7075 on the retreating side. FSW was achieved under three different rotation speeds (898, 1200 and 1710) rpm, three different welding speeds (20, 45 and 69) mm\min , three different pin profiles (cylindrical, threaded cylindrical and cone) and tool tilt angle 2◦. Taguchi method w
... Show MoreIn this paper Alx Ga1-x As:H films have been prepared by using new deposition method based on combination of flash- thermal evaporation technique. The thickness of our samples was about 300nm. The Al concentration was altered within the 0 x 40.
The results of X- ray diffraction analysis (XRD) confirmed the amorphous structure of all AlXGa1-x As:H films with x 40 and annealing temperature (Ta)<200°C. the temperature dependence of the DC conductivity GDC with various Al content has been measured for AlXGa1-x As:H films.
We have found that the thermal activation energy Ea depends of Al content and Ta, thus the value of Ea were approximately equal to half the value of optical gap.
Titanium dioxide nanorods have been prepared by sol-gel template
method. The structural and surface morphology of the TiO2 nanorods was
investigated by X-ray diffraction (XRD) and atomic force microscopy
(AFM), it was found that the nanorods produced were anatase TiO2 phase.
The photocatalytic activity of the TiO2 nanorods was evaluated by the
photo degradation of methyl orange (MO). The relatively higher
degradation efficiency for MO (D%=78.2) was obtained after 6h of exposed
to UV irradiation.
This paper considers a new Double Integral transform called Double Sumudu-Elzaki transform DSET. The combining of the DSET with a semi-analytical method, namely the variational iteration method DSETVIM, to arrive numerical solution of nonlinear PDEs of Fractional Order derivatives. The proposed dual method property decreases the number of calculations required, so combining these two methods leads to calculating the solution's speed. The suggested technique is tested on four problems. The results demonstrated that solving these types of equations using the DSETVIM was more advantageous and efficient