Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the produced key is used to determine the starting pixel in each block for hiding and the direction of hiding (clockwise or anticlockwise). The proposed method is applied on many images with different embedding rate, and many metrics are used to evaluate the performance of the proposed method such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), correlation factor (CF) and Structural Similarity Index Measure (SSIM). It achieves in average 52.225 dB of PSNR, 0.3215 of MSE, 0.9952 of SSIM and 0.9997 of CF with embedding rate 1.5.
Zanthoxylum L. 1753 belongs to the family Rutaceae. The plant, with its forest green color and with its distinctive fragrance attracted the attention of the study, specially it was an exotic to the environment of Iraq. Zanthoxylum is an exotic plant produced to Iraq and planted in gardens as an ever-green aromatic plant named (BUKHUR HINDI), as it is known among sellers and farmers in Iraq, because of the aromatic smell that emanated from the leaves and resembles Indian incense. The plant adapted to environmental conditions and succeeded in growing and blooming. It was examined and diagnosed for the first time in Iraq as Zanthoxylum beechyanum K. Koch. (Chinese pepper tree). Morphological characteristics and anatomical characteristi
... Show MoreTrichomonas vaginalis is a causative agent of trichomoniasis , one of the most common non-viral sexually transmitted disease (STD) over all the world, especially in immunocompromised women such as pregnant. Wet smear and Giemsa stain are the current methods used in hospital to diagnosis trichomoniasis. DNA based diagnosis is still to be validated to diagnose the local isolates, the objective of the present study was to compare the conventional methods of disease diagnosis with the DNA-based method to diagnose Trichomonas incidence in local isolates. In the present study, 105 samples were collected from outpatient women (18-45 years) of Maternity hospital in Mosul who showed a classical presentation of Trichomonas
... Show MoreThis study investigated the ability of using crushed glass solid wastes in water filtration by using a pilot plant, constructed in Al-Wathba water treatment plant in Baghdad. Different depths and different grain sizes of crushed glass were used as mono and dual media with sand and porcelaniate in the filtration process. The mathematical model by Tufenkji and Elimelech was used to evaluate the initial collection efficiency η of these filters. The results indicated that the collection efficiency varied inversely with the filtration rate. For the mono media filters the theoretical ηth values were more than the practical values ηprac calculated from
the experimental work. In the glass filter ηprac was obtained by multiplying ηth by a
Reading roles as the third skill in the range of English as a Foreign Language (EFL) learning. Although the capability of reading in both academic and non-academic texts is assessed on standardized tests, few of oral interpretation of written language excludes images from estimating literary knowledge. This paper highlights strategies of reading comprehension and visual literacy. It aims to investigate either textual or visual reading in EFL can make an impact on students' comprehension. The effective use of visuals changes instructing reading comprehension recently.The imagery-text model can affect developing reading comprehension and enhancing intellectual thinking. The study hypothesizes that there is no relationship between reading and
... Show MoreThis study investigated the ability of using crushed glass solid wastes in water filtration by using a pilot plant, constructed in Al-Wathba water treatment plant in Baghdad. Different depths and different grain sizes of crushed glass were used as mono and dual media with sand and porcelaniate in the filtration process. The mathematical model by Tufenkji and Elimelech was used to evaluate the initial collection efficiency η of these filters. The results indicated that the collection efficiency varied inversely with the filtration rate. For the mono media filters the theoretical ηth values were more than the practical values ηprac calculated from the experimental work. In the glass filter ηprac was obtained by multiplying ηth by a facto
... Show Moreفي كثير من الأحيان يفشل تحليل المربعات الصغرى (LS) تماماً في حالة وجود قيم شاذة في الظواهر المدروسة، اذ ستفقد OLS خصائصها ومن ثم تفقد صفة المقدر الخطي الجيد Beast Linear Unbiased Estimator (BLUE) لِما تسببه الشواذ Outliers من تأثير سيئ علـى نتـائج التحليـل الاحـصائي للبيانـات اذ أن وجودها يؤدي الى إرباك كبير في تحليل البيانات في حالة إستخدام الطرائق التقليدية، ولعلاج هذه المشكلة تم تطوير أساليب إحصائية جديدة بحيث لا تتأثر بالقي
... Show MoreWhen an electron moves from one atom or molecule to another, a charge-transfer complex is formed. The other objects must be able to accept these electrons, and one entity must have free electrons or a tendency to donate them. This resembles an internal oxidation-reduction reaction more. This research aims to shed light on charge transfer complexes formed by polyenes and carotenes, which act as electron-donating molecules due to their alternating double and single bonds. This allows them to create such complexes when interacting with organic molecules that lack electrons. These complexes exhibited distinctive optical and physicochemical properties, enabling them to be adapted for a wide range of applications. In addition, th
... Show MoreThe present work aimed to study effect of (N749 & N3) dyes on TiO2 optical and electrical properties for optoelectronic application. The TiO2 paste prepared by using a doctor blade method. The samples were UV-VIS specterophometricall analyzes of TiO2 before and after immersed in dyes (N749 & N3). The results showed absorption spectra shift toward the visible region due to the adsorption of dye molecules on the surface of oxide nanoparticles. It is seen that the Eg determined to give a value of 3.3eV for TiO2 before immersing in dyes, and immersing in dyes (N749 & N3) are (1.4 &1.6 eV) respectively. The structural properties (XRD), (FTIR) and (SEM) for the sample prepared were investigated and (J-V) characteristics was stu
... Show MoreLong memory analysis is one of the most active areas in econometrics and time series where various methods have been introduced to identify and estimate the long memory parameter in partially integrated time series. One of the most common models used to represent time series that have a long memory is the ARFIMA (Auto Regressive Fractional Integration Moving Average Model) which diffs are a fractional number called the fractional parameter. To analyze and determine the ARFIMA model, the fractal parameter must be estimated. There are many methods for fractional parameter estimation. In this research, the estimation methods were divided into indirect methods, where the Hurst parameter is estimated fir
... Show MoreWith the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show More