In this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.
order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
A few examinations have endeavored to assess a definitive shear quality of a fiber fortified polymer (FRP)- strengthened solid shallow shafts. Be that as it may, need data announced for examining the solid profound pillars strengthened with FRP bars. The majority of these investigations don't think about the blend of the rigidity of both FRP support and cement. This examination builds up a basic swagger adequacy factor model to evaluate the referenced issue. Two sorts of disappointment modes; concrete part and pulverizing disappointment modes were examined. Protection from corner to corner part is chiefly given by the longitudinal FRP support, steel shear fortification, and cement rigidity. The proposed model has been confirmed util
... Show MoreBackground: The aim of this study was to measure the radiopacity (RO) of modified microhybrid composite resins by adding 2 types of nanofillers (Zinc Oxide and Calcium Carbonate) in two concentrations 3% and 5% and comparing them to unmodified microhybrid composite resins and to nanofilled composite resin. Materials and Methods: Two types of composite resin were used (Microhybrid composite MH Quadrent anterior shine and Nanofilled composite resin Filtek Z350 XT), for each tested group five disk-shaped specimens (1-mm-thick and 15 mm diameter) were fabricated. The material samples were radiographed together with the aluminum step wedge. The density of the specimens was determined with a transmission densitometer and was expressed in term of
... Show MorePoly(L-lactic acid) (PLLA)/poly(caprolactone) (PCL) and two types of organoclay (OMMT) including a fatty amide and ocatdecylamine montmorillonite (FA-MMT and ODA-MMT) were employed to produce polymer nanocomposites by melt blending. Materials were characterized using X-ray diffraction (XRD), Fourier transform infrared (FTIR) spectroscopy, thermogravimetric analysis (TGA), elemental analysis, scanning electron microscopy (SEM) and transmission electron microscopy (TEM). Mechanical properties were also investigated for these nanocomposites. The nanocomposites showed increasing mechanical properties and thermal stability. XRD results indicated that the materials formed nanocomposites. SEM morphology showed that increasing content of OMMT reduc
... Show MoreIn this paper the modified trapezoidal rule is presented for solving Volterra linear Integral Equations (V.I.E) of the second kind and we noticed that this procedure is effective in solving the equations. Two examples are given with their comparison tables to answer the validity of the procedure.
Preparation and Characterization of Maleate, Tartarate,and Phthalate Modified Pectin
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More