Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the produced key is used to determine the starting pixel in each block for hiding and the direction of hiding (clockwise or anticlockwise). The proposed method is applied on many images with different embedding rate, and many metrics are used to evaluate the performance of the proposed method such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), correlation factor (CF) and Structural Similarity Index Measure (SSIM). It achieves in average 52.225 dB of PSNR, 0.3215 of MSE, 0.9952 of SSIM and 0.9997 of CF with embedding rate 1.5.
Nuclear structure of 29-34Mg isotopes toward neutron dripline have been investigated using shell model with Skyrme-Hartree–Fock calculations. In particular nuclear densities for proton, neutron, mass and charge densities with their corresponding rms radii, neutron skin thicknesses and inelastic electron scattering form factors are calculated for positive low-lying states. The deduced results are discussed for the transverse form factor and compared with the available experimental data. It has been confirmed that the combining shell model with Hartree-Fock mean field method with Skyrme interaction can accommodate very well the nuclear excitation properties and can reach a highly descriptive and predictive power when investiga
... Show MoreIn this work, the preparation of some new oxazolidine and thiazolidine derivatives has been conducted. This was done over two steps; the first step included the synthesis of Schiff bases A1-A5 in 72-88% yields by the condensation of isonicotinic acid hydrazide and aldehydes. The second step includes the cyclization of derivatives A1-A5 with glycolic acid and thioglycolic acid to obtain the desired products, oxazolidine derivatives B1-B5 (44-60% yields) and thiazolidine derivatives C1-C5 (41-61% yields), respectively. The structure of the prepared compounds was characterized using FT-IR, 1H NMR, and 13C NMR spectroscopy. Some of the produced compounds were tested for antioxidant properties.
The heavy metal cadmium is extremely harmful to both humans and animals. Zinc supplementation protects the biological system and reduces cadmium-induced toxicity. This study aimed to determine whether zinc chloride (ZnCl2) could protect male mice with the damaged liver induced by cadmium chloride (CdCl2). The protective role of zinc chloride and expression of the metallothionein (MT), Ki-67, and Bcl-2 apoptotic proteins in hepatocytes were studied after subchronic exposure of mice to cadmium chloride for 21 days. Thirty male mice were randomly categorized into 6 groups (5 mice/group) as follows: a control group that did not receive any treatment, a group given ZnCl2 at 10 mg/kg alone, and two groups received ZnCl2 (10 mg/kg) i
... Show MoreNatural Language Processing (NLP) deals with analysing, understanding and generating languages likes human. One of the challenges of NLP is training computers to understand the way of learning and using a language as human. Every training session consists of several types of sentences with different context and linguistic structures. Meaning of a sentence depends on actual meaning of main words with their correct positions. Same word can be used as a noun or adjective or others based on their position. In NLP, Word Embedding is a powerful method which is trained on large collection of texts and encoded general semantic and syntactic information of words. Choosing a right word embedding generates more efficient result than others
... Show MoreAchieving goals effectively reflects the success of the institution. However, unless this indicator is coupled with efficiency when achieving goals, the institution will be equal in its achievements, and distinction will remain unachieved. Perhaps the role of the teaching staff in pushing the institution or college towards brilliance focuses on their ability to motivate people on the one hand and their interest in achieving brilliance for the institution. On the other hand, the importance of the research lies in the institution’s reaching a prominent position through the brilliance and creativity of teaching and achieving competition between institutions that make it more brilliance. The study seeks to achieve the goal of the real
... Show MoreLet R be a commutative ring with unity and an R-submodule N is called semimaximal if and only if
the sufficient conditions of F-submodules to be semimaximal .Also the concepts of (simple , semisimple) F- submodules and quotient F- modules are introduced and given some properties .
Objective: To identification environmental and psychological violence's components among collegians’ students of different stages, and gender throughout creating specific questionnaire, and estimating regression of environmental domain effect on psychological domain, as well as measuring powerful of the association contingency between violence's domains in admixed form with respondent characteristics, such that (Demographics, Economics, and Behaviors), and extracting model of estimates impact of studied domains in studying risks, and protective factors among collegians’ students in Baghdad city. Methodolog
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreIn this time, most researchers toward about preparation of compounds according to green chemistry. This research describes the preparation of 2-fluoro-5-(substituted benzylideneamino) benzonitrile under reflux and microwave methods. Six azomethine compounds (B1-6) were synthesized by two methods under reflux and assisted microwave with the comparison between the two methods. Reflux method was prepared of azomethine (B1-6) by reaction of 5-amino-2-fluorobenzonitrile with some aldehyde derivatives with (50–100) mL of absolute ethanol and some quantity of GAA and time is limited between (2–5) hours with a yield between (60–70) percent with recrystallization for appropriate solvents. But the microwave-assisted method was synthesized of co
... Show More