A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method can be considered a success and can be adopted in the field of steganography
Abstract : This research is concerned with studying the best type and method of irrigation as well as the best cultivated area to reduce the cost of producing dunums of wheat crop in Iraq , and was based on data taken from the Ministry of Planning / Central Statistical Organization About cost of wheat crop production for (12) Iraqi governorates except Kurdistan, Nineveh, Salah al-Din, Anbar) and the sample size (554) according to the cost survey carried out by the Ministry of Planning / Central Statistical Organization for 2017, The results of the research showed that there are significant statistical differences between production costs when using t
... Show MoreThe existing study aimed to assess four soil moisture sensors’ capacitive (WH51 and SKU: S EN0193) and resistive (Yl69 and IC Station) abilities, which are affordable and medium-priced for their accuracy in six common soil types in the central region of Iraq. The readings’ calibration for the soil moisture sensor devices continued through two gravimetric methods. The first depended on the protocols’ database, while the second was the traditional calibration method. The second method recorded the lowest analysis error compared with the first. The moderate-cost sensor WH51 showed the lowest standard error (SE), MAD , and RMSE and the highest R² in both methods. The performance accuracy of WH51 was close to readings shown by the manufac
... Show MoreThe Skyrme–Hartree–Fock (SHF) method with the Skyrme
parameters; SKxtb, SGII, SKO, SKxs15, SKxs20 and SKxs25 have
been used to investigate the ground state properties of some 2s-1d
shell nuclei with Z=N (namely; 20Ne, 24Mg, 28Si and 32S) such as, the
charge, proton and matter densities, the corresponding root mean
square (rms) radii, neutron skin thickness, elastic electron scattering
form factors and the binding energy per nucleon. The calculated
results have been discussed and compared with the available
experimental data.
The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh
... Show MoreA novel technique Sumudu transform Adomian decomposition method (STADM), is employed to handle some kinds of nonlinear time-fractional equations. We demonstrate that this method finds the solution without discretization or restrictive assumptions. This method is efficient, simple to implement, and produces good results. The fractional derivative is described in the Caputo sense. The solutions are obtained using STADM, and the results show that the suggested technique is valid and applicable and provides a more refined convergent series solution. The MATLAB software carried out all the computations and graphics. Moreover, a graphical representation was made for the solution of some examples. For integer and fractional order problems, solutio
... Show MoreIraqi crude Atmospheric residual fraction supplied from al-Dura refinery was treated to remove metals contaminants by solvent extraction method, with various hydrocarbon solvents and concentrations. The extraction method using three different type solvent (n-hexane, n-heptane, and light naphtha) were found to be effective for removal of oil-soluble metals from heavy atmospheric residual fraction. Different solvents with using three different hydrocarbon solvents (n-hexane, n-heptane, and light naphtha) .different variables were studied solvent/oil ratios (4/1, 8/1, 10/1, 12/1, and 15/1), different intervals of perceptual (15, 30-60, 90 and 120 min) and different temperature (30, 45, 60 and 90 °C) were used. The metals removal percent we
... Show MoreThe CuInSe2 (CIS) nanocrystals are synthesized by arrested precipitation from molecular precursors are added to a hot solvent with organic cap- ping ligands to control nanocrystal formation and growth. CIS thin films deposited onto glass substrate by spray - coating, then selenized in Ar- atmosphere to form CIS thin films. PVs were made with power conversion efficiencies of 0.631% as -deposited and 0.846% after selenization, for Mo coated, under AM 1.5 illumination. X-ray diffraction (XRD) and energy dispersive spectroscopy (EDS) analysis it is evident that CIS have the chalcopyrite structure as the major phase with a preferred orientation along (112) direction and the atomic ratio of Cu : In : Se in the nanocrystals is nearly 1 : 1 : 2