An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Signal to Noise Ratio is about 55dB. The recovered secret image is extracted (100%) if stego-image has no attack. These methods can provide good hiding capacity and image quality. Several types of attacks have been applied to the proposed methods in order to measure the robustness like (compression, add noise and cropping). The proposed algorithm has been implemented by using computer simulation program MATLAB version 7.9 under windows 7 operating system by Microsoft cooperation.
EFFECT OF SPRAYING IRON AND ZINC CONCENTRATIONS IN GRAIN AND LEAF CONTENT FOR TWO VARIETIES OF WHEAT CROP
To study the response of the celery plant to nitrogen fertilization and spray with salicylic acid in the leaves content of nutrients, the research was conducted in one of the fields of the Department of Horticulture and Gardening Engineering / College of Agriculture / University of Baghdad within the 2019-2018 season. The research was carried out as a global experiment and with the design of complete randomized sectors (RCBD) and with three replicates, the first factor included the addition of nitrogen with three levels and its symbol (N) (N1 control), (N2) g / m2 18 ), (N3) 37 g / m2 and the second factor spraying acid salicylic is denoted by
This work aimed to investigate the effect of Diode laser 805 nm on plasmid DNA and RNA
contents of some Gram negative bacteria represented by Escherichia coli and Proteus mirabilis isolates
.Plasmid extraction was done using two methods (Salting out and CTAB method).Different powers and
pulse repetition rates for 805 nm Diode Laser were used to study this effect. Results revealed that the
plasmid profile of the two species were highly affected using (2, 3) W at different frequencies including
5and 10 kHz as compared with 1 kHz while plasmids were gradually disappeared at 1W, 10 kHz. In the
same time the shining of RNA was also decreased gradually then disappeared with increasing powers
especially at 2W and 10 kHz cau
Designing machines and equipment for post-harvest operations of agricultural products requires information about their physical properties. The aim of the work was to evaluate the possibility of introducing a new approach to predict the moisture content in bean and corn seeds based on measuring their dimensions using image analysis using artificial neural networks (ANN). Experimental tests were carried out at three levels of wet basis moisture content of seeds: 9, 13 and 17%. The analysis of the results showed a direct relationship between the wet basis moisture content and the main dimensions of the seeds. Based on the statistical analysis of the seed material, it was shown that the characteristics
The new liganed Schiff base named [(E)-3-hydroxy-4-((3,4,5- trimethoxybenzylidene)amino) naphthalene-1- sulfonic acid] was synthesized from 3,4,5-trimethoxybenzyldehyde and 1-amino-2-aphthol-4- sulfonic acid in equal molar ratio. A series of new metal complexes' of the common molecular formulation [M(L)2(H2O)2].H2O are synthesized and characterized by IR, UV–Vis spectra, mass spectra, atomic absorption, elemental analyses, chloride content, magnetic susceptibility and conductivity measurements as well as thermo gravimetric analysis (TGA, DSC). Consistent with results of the magnetic and spectral studies, the advised geometrical structures for all of the prepared complexes have been octahedral formula
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreInfrastructure, especially wastewater projects, plays an important role in the life of residential communities. Due to the increasing population growth, there is also a significant increase in residential and commercial facilities. This research aims to develop two models for predicting the cost and time of wastewater projects according to independent variables affecting them. These variables have been determined through a questionnaire distributed to 20 projects under construction in Al-Kut City/ Wasit Governorate/Iraq. The researcher used artificial neural network technology to develop the models. The results showed that the coefficient of correlation R between actual and predicted values were 99.4% and 99 %, MAPE was
... Show More<p>Analyzing X-rays and computed tomography-scan (CT scan) images using a convolutional neural network (CNN) method is a very interesting subject, especially after coronavirus disease 2019 (COVID-19) pandemic. In this paper, a study is made on 423 patients’ CT scan images from Al-Kadhimiya (Madenat Al Emammain Al Kadhmain) hospital in Baghdad, Iraq, to diagnose if they have COVID or not using CNN. The total data being tested has 15000 CT-scan images chosen in a specific way to give a correct diagnosis. The activation function used in this research is the wavelet function, which differs from CNN activation functions. The convolutional wavelet neural network (CWNN) model proposed in this paper is compared with regular convol
... Show MoreDeep submicron technologies continue to develop according to Moore’s law allowing hundreds of processing elements and memory modules to be integrated on a single chip forming multi/many-processor systems-on-chip (MPSoCs). Network on chip (NoC) arose as an interconnection for this large number of processing modules. However, the aggressive scaling of transistors makes NoC more vulnerable to both permanent and transient faults. Permanent faults persistently affect the circuit functionality from the time of their occurrence. The router represents the heart of the NoC. Thus, this research focuses on tolerating permanent faults in the router’s input buffer component, particularly the virtual channel state fields. These fields track packets f
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More