Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the produced key is used to determine the starting pixel in each block for hiding and the direction of hiding (clockwise or anticlockwise). The proposed method is applied on many images with different embedding rate, and many metrics are used to evaluate the performance of the proposed method such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), correlation factor (CF) and Structural Similarity Index Measure (SSIM). It achieves in average 52.225 dB of PSNR, 0.3215 of MSE, 0.9952 of SSIM and 0.9997 of CF with embedding rate 1.5.
The purpose of this study is to evaluate the effect of hydrated lime addition methods as filler replacement on fatigue performance of Hot Mix Asphalt (HMA). Three types of addition methods of hydrated lime were introduced namely dry HL on dry aggregate and saturated surface aggregate above 3% and slurry HL on dry aggregate, ordinary Lime stone powder was reduced by three HL percentage (1.0, 2.0 and 3.0 %). The effect of different methods were investigated on the fatigue properties of HMA using, third-point flexural fatigue bending Test. Pneumatic Repeated Load System (PRLS) was carried out to establish the effect of hydrated lime on the fatigue failure criteria and to select the proper hydrated lime application methods on fatigue behavior o
... Show MoreThe reaction paths of the C-C and C-H bond cleavage in the anthracene and phenanthrene aromatic molecules are studied by applying the ab-initio DFT method. It is found that the C-C bond cleavage proceeds via a singlet aromatic transition state, compelled through a disrotatoric ring opening reaction. A suprafacial H atom shift follows the transition state, leading to the formation of a methylene -CH2 and an acetylenic or allenic moiety. The calculated activation energies for anthracene range from 158.81-208.90 kcal/mol and the reaction energies from 96.106-156.976 kcal/mol. For phenanthrene, the energy values are 157.39-202.34 kcal/mol and 62.639-182.423 kcal/mol, respectively. For the C-H cleavage reactions, the calculated reaction energies
... Show MoreThis study did the isolation, purification, and identification of the fungus Phytophthora cinnamomi of some infected plants, including Chili pepper, cucumber, and eggplant. The green parts of Pimpinella anisum plant were grounded to a semi-powdered state. Phenols, alkaloids and terpenes were extracted from this plant, then the anti-fungal activity was evaluated at different concentrations of 5% and 10%. The percentage of radial growth inhibition of fungi with plant extracts was measured after seven days of incubation. The results showed that the terpene extract was the most effective against fungi and the alkaloid extract had the least antifungal activity. the percentage of radial growth inhibition was
... Show MoreThis paper deals with the thirteenth order differential equations linear and nonlinear in boundary value problems by using the Modified Adomian Decomposition Method (MADM), the analytical results of the equations have been obtained in terms of convergent series with easily computable components. Two numerical examples results show that this method is a promising and powerful tool for solving this problems.
ABSTRACT This paper has a three-pronged objective: offering a unitary set of semantic distinctive features to the analysis of nominal “hatred synonyms” in the lexicon of both English and Standard Arabic (SA), applying it procedurally to test its scope of functionality crosslinguistically, and singling out the closest noun synonymous equivalents among the membership of the two sets in this particular lexical semantic field in both languages. The componential analysis and the matching procedures carried have been functional in identifying ten totally matching equivalents (i.e. at 55.6%), and eight partially matching ones (i.e. at %44.4%). This result shows that while total matching equivalences do exist in the translation of certain Eng
... Show MoreForm the series of generalization of the topic of supra topology is the generalization of separation axioms . In this paper we have been introduced (S * - SS *) regular spaces . Most of the properties of both spaces have been investigated and reinforced with examples . In the last part we presented the notations of supra *- -space ( =0,1) and we studied their relationship with (S * - SS *) regular spaces.
One of the prominent goals of Metrical Phonology Theory is providing stress of poetry on the syllable-, the foot-, and the phonological word- levels. Analysing poetry is one of the most prominent and controversial issues for the involved number and types of syllables, feet, and meters are stable in poetry compared to other literary texts. The prosodic seeds of the theory have been planted by Firth (1948) in English, while in Arabic يديهارفلا in the second half of the eighth century (A.D.) has done so. Investigating the metrical structure of poetry has been conducted in various languages, whereas scrutinising the metrical structure of English and Arabic poetry has received little attention. This study aims at capturing the
... Show MoreThe current research aimed at deducing the psychological contents of Suliman dialogue with the Hodhod and statement applications in school counseling. The researcher followed the Islamic approach in the search, which deals with the study of events, phenomena and practices through a broad understanding of Islamic principles and limitations associated with the general framework of Islam. In addition to the deductive approach is derived from a sub-rule is a general provision.
The research revealed many of the psychological contents, including: the importance of continuing care counselor psychological learners, and follow-up field to their problems, conditions, listen good horseshoe to defend himself, clarify the motives of his ac
The nucleon momentum distributions (NMD) for the ground state and elastic electron scattering form factors have been calculated in the framework of the coherent fluctuation model and expressed in terms of the weight function (fluctuation function). The weight function has been related to the nucleon density distributions of nuclei and determined from theory and experiment. The nucleon density distributions (NDD) is derived from a simple method based on the use of the single particle wave functions of the harmonic oscillator potential and the occupation numbers of the states. The feature of long-tail behavior at high momentum region of the NMD has been obtained using both the theoretical and experimental weight functions. The observed ele
... Show MoreThe soft sets were known since 1999, and because of their wide applications and their great flexibility to solve the problems, we used these concepts to define new types of soft limit points, that we called soft turning points.Finally, we used these points to define new types of soft separation axioms and we study their properties.