The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreBackground: Nephrotic Syndrome (NS) is a clinical entity having multiple causes, characterized by increased glomeular permeability manifested by massive protein urea with variable Tendency towards edema, hypaalbumineima and hyperlipidemia.
This study has applied the theoretical framework of conceptual metaphor theory to the analysis of the source and target domains of metaphors that are used in two English nineteenth century sonnets, both written by contemporaneous female poets. The quantitative and qualitative results of the textual analysis have clearly revealed that Elizabeth Barrett Browning’s sonnet 23 centres around the conceptual mapping of the journey of love and life with that of possession. In contrast, Christina Rossetti’s sonnet Remember tackles the central conceptual mapping of death as a journey in relation to its further experiential connections. In addition, the application of conceptual metaphor theory in identifying the frequencies and densities of metap
... Show MoreGypseous soils are spread in several regions in the world including Iraq, where it covers more than 28.6% [1] of the surface region of the country. This soil, with high gypsum content causes different problems in construction and strategic projects. As a result of water flow through the soil mass, permeability and chemical arrangement of these soils vary over time due to the solubility and leaching of gypsum. In this study the soil of 36% gypsum content, is taken from one location about 100 km (62 mi) southwest of Baghdad, where the sample is taken from depth (0.5 - 1) m below the natural ground surface and mixed with (3%, 6%, 9%) of Copolymer and Styrene-butadiene Rubber to improve t
In this work, we construct projectively distinct (k,3)-arcs in the projective plane PG(2,9) by applying a geometrical method. The cubic curves have been been constructed by using the general equation of the cubic. We found that there are complete (13,3)-arcs, complete (15,3)-arcs and we found that the only (16,3)-arcs lead to maximum completeness
In this research a computational simulation has been carried out on the design and properties of the electrostatic mirror and a mathematical expression has been suggested to represent the axial potential of an electrostatic mirror. The electron beam path using the Bimurzaev technique had been investigated as mirror trajectory with the aid of Runge – Kutta method. The spherical and chromatic aberration coefficients of mirror has computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements. The Electrode shape of mirror two electrodes has been determined by using package SIMION computer program. Computations have shown that the suggested potentials giv
... Show More