In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT decomposition via SVD coefficients extracted from DCT-transformed images in the midfrequency band. A content-aware strategy combining Gaussian blurring, Canny edge detection, and zigzag scanning is employed to increase robustness against image processing attacks. The experimental results demonstrate the effectiveness of the proposed approach, which achieves up to a 10.4% improvement in PSNR, an SSIM score of 0.996, and a 0.10% increase in NCC over those of previous methods, which mostly rely on grayscale images. These results reflect the ability of the system to maintain high visual quality while offering strong resilience and security for embedded data in full-color images.
The present work aims to improve the flux of forward osmosis with the use of Thin Film Composite membrane by reducing the effect of polarization on draw solution (brine solution) side.This study was conducted in two parts. The first is under the effect of polarization in which the flux and the water permeability coefficient (A) were calculated. In the second part of the study the experiments were repeated using a circulating pump at various speeds to make turbulence and reduce the effect of polarization on the brine solution side.
A model capable of predicting water permeability coefficient has been derived, and this is given by the following equations:
Z=Z0 +C.R.T/9.8(d2/D2+1) [Exp. [-9.8(d
In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreIn this work, optical system with different aperture shapes (circular, square, elliptical and triangle aperture) has been used for efficiency evaluation when the system involved moving factor in ideal case (aberration free). The optical system evaluate far moving object, therefore the image forming at image plane due to point spread function (image formula of incoherently illuminated point object). A mathematical treatment has been used to getting results by Gaussian numerical calculations method. The results show priority of circular aperture when optical system that submits of moving factor.
Aeration system in the cultivation of Chlorella Sp. Microalgae using dairy wastewater as culture media was addressed in the current study. This research aimed to study the effect of aeration in the bubble column bioreactor on the biological synergy between microalgae and bacteria if they are present in the same place. The results show that the sterilization stage is not the dominant step in the success of microalgae cultivation in water-rich organic waste. There is a clear convergence between the growth rate of Chlorella microalgae in the sterilized and non-sterilized culture media, which gives realism if the proposal is applied industrially. Through the information obtained the aerobic bacteria in the non-sterilized me
... Show MoreThe utilization of artificial intelligence techniques has garnered significant interest in recent research due to their pivotal role in enhancing the quality of educational offerings. This study investigated the impact of employing artificial intelligence techniques on improving the quality of educational services, as perceived by students enrolled in the College of Pharmacy at the University of Baghdad. The study sample comprised 379 male and female students. A descriptive-analytical approach was used, with a questionnaire as the primary tool for data collection. The findings indicated that the application of artificial intelligence methods was highly effective, and the educational services provided to students were of exceptional quality.
... Show MoreThe utilization of artificial intelligence techniques has garnered significant interest in recent research due to their pivotal role in enhancing the quality of educational offerings. This study investigated the impact of employing artificial intelligence techniques on improving the quality of educational services, as perceived by students enrolled in the College of Pharmacy at the University of Baghdad. The study sample comprised 379 male and female students. A descriptive-analytical approach was used, with a questionnaire as the primary tool for data collection. The findings indicated that the application of artificial intelligence methods was highly effective, and the educational services provided to students were of exceptional
... Show MoreThe issue of insurance against unlawful risks raises a jurisprudential and judicial debate between two opposing trends: the first considers coverage of these risks invalid due to their impact on public order or morals, while the second—which this research analyses—calls for the possibility of covering these risks in specific circumstances, based on contractual considerations in accordance with the principle that the contract is the law of the contracting parties, and based on the obligation to compensate the harmed third party—the victim—who has no connection to the unlawful act. In this context, our research highlights that contractual considerations can justify coverage of some unlawful risks, provided that the goal is to achieve
... Show MoreThe research tackles an important subject, namely, the light text and how it works well in the Arab television programs. The methodological framework of the research presents the research problem stated in the following question: How can the text be used and what is its impact in the Arab TV programs? The importance of this research is that it deals with the subject of light text and its impact on Arab television programs.
This study is useful to the workers and scholars in the field of lighting as well as the goal of the research in (studying of the employment of light text in Arab television programs).
The limits of research were manifested in the study of the light text and how to make use of it
... Show More