Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the produced key is used to determine the starting pixel in each block for hiding and the direction of hiding (clockwise or anticlockwise). The proposed method is applied on many images with different embedding rate, and many metrics are used to evaluate the performance of the proposed method such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), correlation factor (CF) and Structural Similarity Index Measure (SSIM). It achieves in average 52.225 dB of PSNR, 0.3215 of MSE, 0.9952 of SSIM and 0.9997 of CF with embedding rate 1.5.
A theoretical calculation of the reorientation energy for non adiabatic electron transfer at
interface between metal and semiconductor system was carried out. The continuum outer
sphere theory of electron transfer reaction has been extensively used for electron transfer
between metal/semiconductor interface .It is found that in these calculations the reorientation
energy is proportional to the optical and statistical dielectric constant of semiconductor ,
properties of metal ,and the distance between metal and semiconductor .Results of
reorientation energy show that ZnO semiconductor with metal Au possess a good matching as
compared with ZnS and ZnSe . Theoretical calculation showed a good agreement with
ex
Refuse derived fuel (RDF) is considered one of the most important types of low cost thermal energy which can be tapped in the industry, especially the cement industry in particular being the need of high thermal energy during the production processes, and in this paper we have implemented the use of a derivative of the fuel RDF as a substitute for gasoline , to reduce production costs and thereby achieve production efficiency, and the methodology used in this research statistical analysis as well as the use of the cost of kaizen target for the purpose of reducing costs and achieve production efficiency, and this has reduced the cost total cement production by which led to reduce total costs of cement production by 8.4% and an incre
... Show MoreThe monetary policy is a vital method used in implementing monetary stability through: the management of income and adjustment of the price (monetary targets) in order to promote stability and growth of real output (non-cash goals); the tool of interest rate and direct investment guides or movement towards the desired destination; and supervisory instruments of monetary policy in both quantitative and qualitative. The latter is very important as a standard compass to investigate the purposes of the movement monetary policy in the economy. The public and businesses were given monetary policy signals by those tools. In fiscal policy, there are specific techniques to follow to do the spending and collection of revenue. This is done in order to
... Show MoreThe Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images inst
... Show MoreA comparison of gas sensing performance of V2O5:Ag nanoparticles as thin film and as bulk pellet toward NO2 and NH3 is presented. V2O5:Ag nanoparticles thin films were deposited by vacuum thermal evaporation method on glass substrates while the pellets were prepared by powder technology. XRD patterns of thin film and pellet were polycrystalline with an orthorhombic structure. The value of average grain size is about 60 nm. The morphological properties of the samples have been distinguished by atomic force microscopy (AFM) and field effect scanning electron microscopy (FESEM) which indicated that the films showed homogeneous surfaces morphology a
... Show MoreA topological index, commonly referred to as a connectivity index, is a molecular structural descriptor that describes a chemical compound's topology. Topological indices are a major topic in graph theory. In this paper, we first define a new graph, which is a concept from the coronavirus, called a corona graph, and then we give some theoretical results for the Wiener and the hyper Wiener index of a graph, according to ( the number of pairs of vertices (u, v) of G that are at a distance . Moreover, calculate some topological indices degree-based, such as the first and second Zagreb index, , and index, and first and second Gourava index for the recent graph. In addition, we introduced a new topological index, the , w
... Show MoreThe study aimed to reveal the degree of inclusion of media concepts in the books of social and national studies in general education in light of the criteria of media education and the nature of the Saudi society. Additionally, to identify the estimations of the participants in the study of the importance of including media concepts in these books, and to build a matrix of the range and sequence of media concepts in the books of social and national studies in the grades of Saudi general education. The study followed the descriptive approach in both descriptive analysis of the textbooks and descriptive survey of the study participants who were (203) students in the schools of boys and girls in general education in Makkah. The study used t
... Show MoreIn this paper, we introduce an exponential of an operator defined on a Hilbert space H, and we study its properties and find some of properties of T inherited to exponential operator, so we study the spectrum of exponential operator e^T according to the operator T.
In this paper, one of the Machine Scheduling Problems is studied, which is the problem of scheduling a number of products (n-jobs) on one (single) machine with the multi-criteria objective function. These functions are (completion time, the tardiness, the earliness, and the late work) which formulated as . The branch and bound (BAB) method are used as the main method for solving the problem, where four upper bounds and one lower bound are proposed and a number of dominance rules are considered to reduce the number of branches in the search tree. The genetic algorithm (GA) and the particle swarm optimization (PSO) are used to obtain two of the upper bounds. The computational results are calculated by coding (progr
... Show More