An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Signal to Noise Ratio is about 55dB. The recovered secret image is extracted (100%) if stego-image has no attack. These methods can provide good hiding capacity and image quality. Several types of attacks have been applied to the proposed methods in order to measure the robustness like (compression, add noise and cropping). The proposed algorithm has been implemented by using computer simulation program MATLAB version 7.9 under windows 7 operating system by Microsoft cooperation.
Seven fish species were collected from the drainage network at Al-Madaen region, south of
Baghdad with the aid of a cast net during the period from March to August 1993. These fishes
were infected with 22 parasite species (seven sporozoans, three ciliated protozoans, seven
monogeneans, two nematodes, one acanthocephalan and two crustaceans) and one fungus
species. Among such parasites, Chloromyxum wardi and Cystidicola sp. are reported here for
the first time in Iraq. In addition, 11 new host records are added to the list of parasites of
fishes of Iraq.
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreInfrastructure, especially wastewater projects, plays an important role in the life of residential communities. Due to the increasing population growth, there is also a significant increase in residential and commercial facilities. This research aims to develop two models for predicting the cost and time of wastewater projects according to independent variables affecting them. These variables have been determined through a questionnaire distributed to 20 projects under construction in Al-Kut City/ Wasit Governorate/Iraq. The researcher used artificial neural network technology to develop the models. The results showed that the coefficient of correlation R between actual and predicted values were 99.4% and 99 %, MAPE was
... Show MoreABSTRACT: Ultimate bearing capacity of soft ground reinforced with stone column was recently predicted using various artificial intelligence technologies such as artificial neural network because of all the advantages that they can offer in minimizing time, effort and cost. As well as, most of applied theories or predicted formulas deduced analytically from previous studies were feasible only for a particular testing environment and do not match other field or laboratory datasets. However, the performance of such techniques depends largely on input parameters that really affect the target output and missing of any parameter can lead to inaccurate results and give a false indicator. In the current study, data were collected from previous rel
... Show MoreThe study was conducted during spring seasons of 2000 and 2001.The aim was to study the changes in the moisture content of sunflower plants during growth stages under hardening conditions to drought tolerance .Agricultural practices were made according to recommendation. Asplit-split plots design was used with three replications. The main plots included irrigation treatments:irrigation to100%(full irrigation),75and50%of available water. The sub plots were the cultivars Euroflor and Flame.The sub-sub plots represented four seed soaking treatments: Control (unsoaked), soaking in water ,Paclobutrazol solution(250ppm),and Pix solution(500ppm). The soaking continued for 24 hours then seeds were dried at room temperature until they regained t
... Show MoreStevia rebaudiana Bertoni contains diterpenoid steviol glycosides that have no adverse impact on blood sugar levels despite being 300 times sweeter than sugar. This study aimed to investigate the rate of callus induction from stevia leaves and the content of glycosides when changing the sucrose percentage in the culture medium.. Murashige and Skoog (MS) culture medium supported by 4.0 mg/l naphthalene acetic acid (NAA) and 1.0 mg/l benzyl adenine (BA) was used, and different concentrations of sucrose (2, 3, 4, 5 and 6%) were tested .The extraction of glycosides from leaf and callus tissues was performed by using methanol. Extracted glycosides were analyzed by high-performance liquid chromatography (HPLC). The results showed signific
... Show MoreThe Rwandan author of comfort chests and verse pleasure of the most important historians of the Seljuks in the sixth century AH / twelfth century and belongs to the mostly ethnic scientists family has won favor with the Sultans of the Seljuks until he became the most famous Markhém is his main source of research sources with respect to the political and social history the Seljuks and the relationship of the Seljuk sultans of the Abbasid caliphs in Baghdad.
The book included the history of the Seljuks from the time of statehood in the fifth century AH / atheist century AD until the death of the Sultan Tgrl bin Arslan year 590 AH / 1193 AD and then shed Akhawarzmeyen, and touched the author at the end of the book in separate chapters t
Abstract
This paper represents a study of the effect of the soil type, the drilling parameters and the drilling tool properties on the dynamic vibrational behavior of the drilling rig and its assessment in the drilling system. So first, an experimental drilling rig was designed and constructed to embrace the numerical work.
The experimental work included implementation of the drill-string in different types of soil with different properties according to the difference in the grains size, at different rotational speeds (RPM), and different weights on bit (WOB) (Thrust force), in a way that allows establishing the charts that correlate the vibration acceleration, the rate of penetration (ROP), and the power
... Show MoreConjugated Linoleic Acid (CLA) is an essential polyunsaturated omega fatty acid that occurs naturally in vegetable oils. It also plays an important role in preserving meat for longer periods by preventing oxidation of other fats. Thus, it can be used in the production of functional foods with high biological value and low cholesterol levels by adding poultry diets. Objective: The aim of the present study was to evaluate the effect of adding CLA to broiler diets on production performance and fatty acid content in the meat. Methodology: One-day-old Ross-308 chicks were randomly distributed into four dietary treatment groups: control (0 g CLA kgG1 diet; A1), 0.5 g CLA kgG1 diet (A2), 0.75 g CLA kgG1 diet (A3) and 1 g CLA kgG1 diet (A4). Diets
... Show MoreThe aim of the research is to identify the imaginative thinking skills included in the content of the chemistry textbook for fifth-grade students in biological sciences at the preparatory stage, which is approved by the Ministry of Education, General Directorate of Curricula in the academic year 2020-2021. To achieve the objective of the study, the researcher depends on the previous studies in the field and content of imaginative thinking skills for preparing a list of skills that includes (3) essential skills and (11) sub-skills and (28) items related to all skills. The researcher adopted the analytical descriptive approach because of its appropriation of the goals of the research. Then the researcher analyzed the content of the book de
... Show More