In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the stego-image and also it is robust, to some extents against several levels of JPEG compression.
Objective: This study evaluated the effect of immediate dentin sealing on the marginal adaptation of lithium disilicate overlays with three different types of resin-luting agents: preheated composite, dual-cure adhesive resin, and flowable composite. Materials and Methods: Forty-eight maxillary first premolars of similar size were prepared with a butt joint preparation design. The teeth were separated into two primary groups, each with twenty-four teeth: Group DDS: Delay dentin sealing (non-IDS) teeth were not treated. Group IDS: dentin sealing was applied immediately after teeth preparation. Each group was subsequently separated into three separate subgroups. Subgroups (DDS+Phc, IDS+Phc): cemented with preheated composite (Enamel plus HRi,
... Show MoreThe objective of this research is to identify the effect of Using Fryer strategy on achievement and systemic thinking in the subject of chemistry of second class intermediate school students. The sample of research consisted of 59 students in one intermediate school in Baghdad/Iraq, split into two groups; experimental and control. The scientific material of the study is related to Chapters II and III of the Science Book for the second Intermediate School for the Year (2019-2020). The scientific test is composed of 25 test items whilst the second instrument for research related to systematic thinking test consisted of 12 items. The results of the research showed that the use of Fryer's chemistry-teaching strategy has increased achievement an
... Show MoreThe ZnO nanoparticles were synthesized at various precursor concentrations i.e. 0.05, 0.1, and 0.5 M by biosynthesis method based on Pometia pinnata Leaf Extracts. Initial nanoparticle concentration influenced the optical bandgap, shape, and structure of nanoparticles. The photodegradation process was carried out under UV illumination. The efficiency of MB degradation was determined by measuring the decrease in MB concentration and by analyzing the optical absorption at 663 nm recorded by UV-Vis spectroscopy. Results showed that the biosynthesized ZnO nanoparticles exhibited efficient photodegradation of MB, with a maximum degradation rate of 80% after 90 minutes of exposure to UV-C light. The study highlights the potential of Pometia pi
... Show MoreGray-Scale Image Brightness/Contrast Enhancement with Multi-Model
Histogram linear Contrast Stretching (MMHLCS) method
The intellectual and religious characteristics were an influential presence in the same Andalusian poet, especially among the poets of Beni El-Ahmar because they are part of the heritage of poets, and that is to push them towards the glory of this heritage and to take care of it and benefit from its inclusion, inspiration and similarity.
That this inflection on the poetic heritage is justified by the poets of the sons of the Red were inclined to preserve the inherited values, especially as it was related to their poetry, especially that the Andalusian poet did not find embarrassment in the inspiration of heritage and emerged when he mentioned the homes and the ruins and the camel and the journey, although the community Andalusian
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show Moreم.د. فاطمة حميد ،أ.م.د وفاء صباح محمد الخفاجي, International Journal of Psychosocial Rehabilitation,, 2020 - Cited by 1
The aim of this investigation was to study the impact of various reaction parameters on wastewater taken from Al-Wathba water treatment plant on Tigris River in south of Baghdad, Iraq with sodium hypochlorite solution. The parameters studied were sodium hypochlorite dose, contact time, initial fecal coliform bacteria concentration, temperature, and pH. In a batch reactor, different concentrations of sodium hypochlorite solution were used to disinfect 1L of water. The amount of hypochlorite ions in disinfected water was measured using an Iodimetry test for different reaction times, whereas the Most Probable Number (MPN) test was used to determine the concentration of coliform bacteria. Total Plate Count (TPC) was utilized in this study to
... Show More