Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Throughout what mentioned above, It is obvious that the aware narrator in these biography models was the strongest tool in presenting the content, especially the biographies under study were written by feminine hands, striving to prove her identity by all means and ways. In addition, we can suppose that the hiding of she writer behind the character is no more than a mask, by which she want to mask herself so that she can express herself frankly and freely, especially when she talks about subjects that are inconsistent with the society, customs and traditions. It is important to refer that the existence of the participant narrator in the biographies under study does not prevent the presence of another narrator such as external or aware na
... Show MoreMulti-nationalities companies are the main companies in the progressed
countries that improve the current technology and, thus, become the main source of it.
These companies, in the first place, aim to increase the profits of its
investments to satisfy stock holders in the original countries to which these companies
belong.
It is a mean to interfere in the economic of countries especially the growing
ones and exploit their important natural resources. Since this research focus on the
dangers of these companies, mechanism of its work and its dangers on the most
important natural resources of our country which is oil; therefore, the research
confirm that this important natural treasure must be under an Iraqi cont
The laser micro-cutting process is the most widely commonly applied machining process which can be applied to practically all metallic and non-metallic materials. While this had challenges in cutting quality criteria such as geometrical precision, surface quality and numerous others. This article investigates the laser micro-cutting of PEEK composite material using nano-fiber laser, due to their significant importunity and efficiency of laser in various manufacturing processes. Design of experiential tool based on Response Surface Methodology (RSM)-Central Composite Design (CCD) used to generate the statistical model. This method was employed to analysis the influence of parameters including laser speed,
... Show MoreThe aim of the current study was to develop a nanostructured double-layer for hydrophobic molecules delivery system. The developed double-layer consisted of polyethylene glycol-based polymeric (PEG) followed by gelatin sub coating of the core hydrophobic molecules containing sodium citrate. The polymeric composition ratio of PEG and the amount of the sub coating gelatin were optimized using the two-level fractional method. The nanoparticles were characterized using AFM and FT-IR techniques. The size of these nano capsules was in the range of 39-76 nm depending on drug loading concentration. The drug was effectively loaded into PEG-Gelatin nanoparticles (≈47%). The hydrophobic molecules-release characteristics in terms of controlled-releas
... Show MoreModeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show MoreThe present research aims to design an electronic system based on cloud computing to develop electronic tasks for students of the University of Mosul. Achieving this goal required designing an electronic system that includes all theoretical information, applied procedures, instructions, orders for computer programs, and identifying its effectiveness in developing Electronic tasks for students of the University of Mosul. Accordingly, the researchers formulated three hypotheses related to the cognitive and performance aspects of the electronic tasks. To verify the research hypotheses, a sample of (91) students is intentionally chosen from the research community, represented by the students of the college of education for humanities and col
... Show MoreThere have been many writings and discussions that dealt with the details and interpretation of the research methods and the identification of the methods and methodological methods used by researchers and writers as they deal with research topics and problems in all fields of natural and human sciences. But we noticed that the movement of science and its knowledge and development requires the identification of suitable tools and methodological methods appropriate for each type of science. In other words, attempts should be established to build appropriate methodological tools for human and cognitive activity that can be referred to as a specific science that sets out certain paths of the human sciences which is certainly the ori
... Show More