An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si
... Show MoreIn this work, the possibility of utilizing osmosis phenomenon to produce energy as a type of the renewable energy using Thin Film Composite Ultra Low Pressure membrane TFC-ULP was studied. Where by forward osmosis water passes through the membrane toward the concentrated brine solution, this will lead to raise the head of the high brine solution. This developed static head may be used to produce energy. The aim of the present work is to study the static head developed and the flux on the high brine water solution side when using forward and reverse osmosis membranes for an initial concentration range from 35-300 g/l for each type of membrane used at room temperature and pressure conditions, and finally calculating the maximum possible po
... Show MoreA new bio-electrochemical system was proposed for simultaneous removal of organic matters and salinity from actual domestic wastewater and synthetically prepared saline water, respectively. The performance of a three-chambered microbial osmotic fuel cell (MOFC) provided with forward osmosis (FO) membrane and cation exchange membrane (CEM) was evaluated with respect to the chemical oxygen demand (COD) removal from wastewater, electricity generation, and desalination of saline water. The MOFC wasinoculated with activated sludge and fueled with actual domestic wastewater. Results revealed that maximum removal efficiency of COD from wastewater, TDS removal efficiency from saline water, power density, and current density were
... Show MoreEntropy generation was studied for new type of heat exchanger (shell and double concentric tubes heat exchanger). Parameters of hot oil flow rate, temperature of inlet hot oil and pressure drop were investigated with the concept of entropy generation. The results showed that the value of entropy generation increased with increasing the flow rate of hot oil and when cold water flow rate was doubled from 20 to 40 l/min, these values were larger. On the other hand, entropy generation increased with increasing the hot oil inlet temperature at a certain flow rate of hot oil. Furthermore, at a certain hot oil inlet temperature, the entropy generation increased with the pressure drop at different hot oil inlet flow rates. Final
... Show MoreA large amount of thermal energy is generated from burning hazardous chemical wastes, and the temperature of the flue gases in hazardous waste incinerators reaches up to (1200 °C). The flue gases are cooled to (40°C) and are treated before emission. This thermal energy can be utilized to produce electrical power by designing a system suitable for dangerous flue gases in the future depending on the results of much research about using a proto-type small steam power plant that uses safe fuel to study and develop the electricity generation process with water tube boiler which is manufactured experimentally with theoretical development for some of its parts which are inefficient in experimental work. The studied system gen
... Show MoreThe biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show MoreThe aim of this research is to find out the influence of Daniel's model on the skills of the twenty-first century among the students of the scientific-fifth grade at the secondary and preparatory government morning schools for the academic year 2022- 2023. Two groups were chosen out of five groups for the fifth-scientific grade, one of which represents the experimental group that is taught by the Daniel model, and the other is the control group that is taught in the traditional method. The equivalence of the two research groups was verified with a set of variables. As for the research tool, a scale was developed by the researchers for the skills of the twenty-first century, in which they adopted the framework of the Partnership Organizat
... Show MoreProviding Iraqi students with proficiency in English is the ultimate goal of the educational system which is a way of getting knowledge in the fields of arts, sciences, transferring knowledge and sciences to other communities. Therefore, conducting such a type of study is very important because the contents of English textbooks have a huge influence on learning of the students. Once the content of English textbooks contain errors as the correct one, this will effect on his/her learning. The present study is an attempt to evaluate the new course entitled “English for Iraq” for fifth grade students for secondary schools, by Olivia Johnston and Mark Farell. It aims to answer eleven questions relating to the following domains: strength, obj
... Show MoreTo investigate the research objectives, the researchers put the following hypothesis:
There was no statistically significant difference at the level of (0.05) between the average score of the students of the experimental group who studied the language of rhetoric according to model of learning method, and the average score of the students of the control group who studied the same article in the traditional way acquiring rhetorical concept. The researchers relied on the experimental design with the partial setting of the post-test, which depends on the experimental group that is taught using the model of the learning method, and the control group taught using the traditional method.
... Show More