Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sharing and the generating random positions of hiding. This method has been in hiding a text file and recovered without loss of information, as well as not noticing any deformation of the image. Where it was hiding a text file size of 20 KB in image cover (250x250) pixels, the result of MSE is 0.696 and PSNR is 49.211.
Accurate emotion categorization is an important and challenging task in computer vision and image processing fields. Facial emotion recognition system implies three important stages: Prep-processing and face area allocation, feature extraction and classification. In this study a new system based on geometric features (distances and angles) set derived from the basic facial components such as eyes, eyebrows and mouth using analytical geometry calculations. For classification stage feed forward neural network classifier is used. For evaluation purpose the Standard database "JAFFE" have been used as test material; it holds face samples for seven basic emotions. The results of conducted tests indicate that the use of suggested distances, angles
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreThe removal of Ibuprofen antibiotics (IBU) by photo-degradation UV/H2O2/Fe+2 system was investigated in a batch reactor under different initial concentrations of H2O2 (100-500) mg/L, Fe+2 (10-40) mg/L, pH (3-9) and initial concentrations of IBU (10-80) mg/L, and their relationship with the degradation efficiency were studied. The result demonstrated that the maximum elimination of IBU was 85.54% achieved at 300 mg/L of H2O2, 30 mg/L of Fe+2, pH=3, and irradiation time of 150 min, for 10 mg/L of IBU. The results have shown that the oxidation reagent H2O2 plays a very important role in IBU degradation.
Linear and mass attenuation coefficient of reactive powder concrete (RPC) sample ( of compressive strength equal to 70 Mpa) using beta particles and gamma ray with different energies have been calculated as a function of the absorber thickness and energy. The attenuation coefficient were obtained using NaI(Tl) energy selective scintillation counter with 90Sr/90Y beta source having an energy rang from (0.546-2.274) MeV and gamma ray energies (0.569, 0.662, 1.063, 1.17 and 1.33) MeV . The attenuation coefficient usually depends upon the energy of radiations and nature of the material. The result represented in graphical forms. Exponential decay was observed. It is found that the capability of reactive powder concrete to absorber beta particle
... Show MoreGypseous soils are common in several regions in the world including Iraq, where more than 28.6% of its surface is covered with this type of soil. This soil, with high gypsum content, causes different problems for construction and strategic projects. As a result of water flow through the soil mass, the permeability and chemical arrangement of these soils varies with time due to the solubility and leaching of gypsum. In this study, the soil of 36% gypsum content, was taken from one location about 100 km southwest of Baghdad, where the samples were taken from depths (0.5 - 1) m below the natural ground and mixed with (3%, 6%, 9%) of Copolymer and Novolac polymer to improve the engineering properties that include: collapsibility, perm
... Show MoreThe aim of this research is to compare traditional and modern methods to obtain the optimal solution using dynamic programming and intelligent algorithms to solve the problems of project management.
It shows the possible ways in which these problems can be addressed, drawing on a schedule of interrelated and sequential activities And clarifies the relationships between the activities to determine the beginning and end of each activity and determine the duration and cost of the total project and estimate the times used by each activity and determine the objectives sought by the project through planning, implementation and monitoring to maintain the budget assessed
... Show MoreIndirect electrochemical oxidation of phenol and its derivatives was investigated by using MnO2 rotating cylinder electrode. Taguchi experimental design method was employed to find the best conditions for the removal efficiency of phenol and its derivatives generated during the process. Two main parameters were investigated, current density (C.D.) and electrolysis time. The removal efficiency was considered as a response for the phenol and other organics removal. An orthogonal array L16, the signal to noise (S/N) ratio, and the analysis of variance were used to test the effect of designated process factors and their levels on the performance of phenol and other organics removal efficiency. The results showed that th
... Show MoreIn this paper we present a method to analyze five types with fifteen wavelet families for eighteen different EMG signals. A comparison study is also given to show performance of various families after modifying the results with back propagation Neural Network. This is actually will help the researchers with the first step of EMG analysis. Huge sets of results (more than 100 sets) are proposed and then classified to be discussed and reach the final.