Learn More
In this paper, we intend to introduce a steganography algorithm for embedding a message into a RGB 24-bit color image. It will be done by using the concepts of linked list data structure. It will help us to achieve some important advantages. First, we can create a " stego-key " by the address of message blocks. Second, it makes the detection of message(More)
In this paper, we are going to introduce different types of steganography considering the cover data. As the first step, we will talk about text steganography and investigate its details. Then, image steganography and its techniques will be investigated. Some techniques including Least Significant Bits, Masking and filtering and Transformations will be(More)
In this paper, we propose using distributed diffusion adaptive networks for acoustic signature identification, as a time-varying autoregressive (TVAR) stochastic model. A distributed adaptive sensor network considers spatio-temporal challenges simultaneously. To analyze diffusion networks under TVAR modeling problem circumstances, we investigate and(More)
Biodegradable copolymeric polymersomes have been used for controlled drug delivery of proteins. These polymersomes important areas to overcome formulation associated problems of the proteins. The aim of this study was to develop polymersomes using biodegradable copolymers for delivery of bovine serum albumin (BSA) as a model protein. Encapsulated BSA by(More)
In this paper, we intend to introduce a new heuristic algorithm to apply maximum minimization to Boolean functions with normal SOP form. To implement the proposed algorithm, we use the graph data structure and define the adjacencies. Also, we demonstrate some conditions to achieve the maximum minimization. Through this paper, the problem of shared vertices(More)
One of the challenging topics in image processing is extracting the shapes from noisy backgrounds. There are some methods for doing it from different kinds of noisy backgrounds. In this paper, we are going to introduce another method by using 4 steps to extract circular shapes from impulse noisy backgrounds. First step is applying median filter to disappear(More)
In this paper, we thoroughly investigate the tracking behavior of a wide range of adaptive networks under non-stationary conditions. Under these conditions, we study and analyze the mean-square-error performance of all centralized, incremental, and diffusion algorithms for adaptive networks. The closed forms of the steady-state mean-square deviation (MSD)(More)
In this paper, we propose three different algorithms capable of facing spatio-temporal variations for parametric modeling and power spectral density (PSD) estimation using Wireless Sensor Networks (WSNs). To do this, we first validate the proposed algorithms using theoretical and mathematical formulations. Afterwards, employing simulation tasks supports the(More)
In the modern world that the lives are going to have an online aspect in addition to traditional life, having suitable websites for different purposes plays a big role in social communications. High quality communication is the product of good interaction, and a good online interaction is the product of a good website. In this paper, we want to introduce(More)