order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
A total of 50 fertile human hydatid cases {33(66%) females and (34%) males}, obtained from Al-Ramadi public Hospital during the period from December 2003 to July 2004 were examined to study any bacterial infections. The specimens were obtained from hydatid fluid and then cultured on appropriate culture media to distinguish some species of bacteria which resulted in obtaining: Staphylococcus aureus (18%), Pseudomonas aeruginosa(12%), Escherichia coli(6%) and Streptococcus pneumonia (4%). These bacteria were confirmed by isolation from interacyst fluid and blood culture technique. The possible routs of infection may be through blood, biliary ducts and bronchioles .The selectivity permeable of the cyst wall may be absent and that may allow
... Show MoreNowadays, the robotic arm is fast becoming the most popular robotic form used in the industry among others. Therefore, the issues regarding remote monitoring and controlling system are very important, which measures different environmental parameters at a distance away from the room and sets various condition for a desired environment through a wireless communication system operated from a central room. Thus, it is crucial to create a programming system which can control the movement of each part of the industrial robot in order to ensure it functions properly. EDARM ED-7100 is one of the simplest models of the robotic arm, which has a manual controller to control the movement of the robotic arm. In order to improve this control s
... Show MoreThe study aimed to investigate the effect of fungicides chlorothalonil at different concentrations ( 0.1 , 0.5 , 5 , 25 , 50 ) × 10 - 5 M on some cytogenetic parameters of human peripheral blood lymphocytes . The genotoxicity parameters were estimated by the number of chromosomal aberrations (CAs) and their types and by estimating the induced micronuclei (Mn) . Cytotoxic effect recorded by estimating the mitotic index (MI) . Results revealed that the fungicide increased the CAs in dose – response pattern with positive correlation coefficient ( r = + 0.964) , there was a significant differences among the concentrations (P<0.01) . The major CAs records chromosomal breakage at concentrations. 0.5 , 5 , 25 , and 50 , while the lowest concen
... Show MoreIn this work, we are obviously interested in a general solution for the calculation of the image of a single bar in partially coherent illumination. The solution is based on the theory of Hopkins for the formation of images in optical instruments in which it was shown that for all practical cases, the illumination of the object may be considered as due to a self – luminous source placed at the exit pupil of the condenser , and the diffraction integral describing the intensity distribution in the image of a single bar – as an object with half – width (U0 = 8 ) and circular aperture geometry is viewed , which by suitable choice of the coherence parameters (S=0.25,1.0.4.0) can be fitted to the observed distribution in various types of mi
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreEat this research study features Technical Ceramics Islamic and Chinese The study of four chapters , such as the first chapter the general framework for research and containing the problem that put the following question: Mamdy effect features art on porcelain Islamic and Chinese ) , and whether there are dimensions of the aesthetic , intellectual and ideological in porcelain Islamic and Chinese with lies the importance of research in the promise of a qualitative study and add a scientific theme features art in porcelain Islamic and China , and the objectives of this study One was in the detection of features technical Ceramics Islamic and Chinese study examined the length of time the ninth century AD , and the tenth century AD , and in
... Show MoreThe city of Derna has distinctive architectural and architectural features, like other Arab and Islamic cities in the Arab West and North Africa. Its markets and shops have taken many different forms and structural forms within the urban fabric of the central commercial zone. The meeting between the various commercial and handicraft jobs and consumers within a spatial area starting with the old markets of the dark market and the agency of the harvest and vegetable market and the mosque of the old and the square of the mosque and the Red Square and the square Kharazin. It then grew linearly towards commercial hubs that were associated with the city's expansion axes. Old markets represent the architectural and planning heritage associated
... Show More