Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods in terms of average segmental SNR, number of failing samples, and Czekanowski Distance (CZD). In addition, the proposed method shows the ability to operate with large message sizes (up to half of carrier size) with graceful degradation as opposed to the other methods which fail at large message size. So, the proposed method provides more flexibility in message and carrier sizes while preserving high efficiency.
The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreConcrete is the main construction material of many structures. Exposing to loads creates cracks in concrete, which reduce the performance and durability. The decrease of concrete cracks becomes a necessity demand to ensure more durability and structural integrity of the concrete structure. Autogenous healing concrete is a kind of new smart concretes, which has the ability to reclose its cracks by means of itself. Concrete self-healing is a type of free repairs processes, which is reduce direct and indirect cost of maintenance and repairing. This work targets to inspect the mechanical properties of concrete after using two combinations of two materials (20 kg/m3 calcium hydroxide Ca(OH
The research presented the tagged (aesthetic and expressive characteristics in the works of Jean Dubuffet), so the research objective was: to know the aesthetic and expressive characteristics in the works of (Jean Dubuffet), and the research included four chapters. The aim of the research, the limits of the research, and the definition of terms. The second chapter included four topics. The first topic presented the aesthetic essence and style, while the second topic dealt with expressionism: approaches in concept and meaning.
While the third topic was preoccupied with presenting the aesthetic and expressiveness in the drawings of modernity and beyond, while the fourth topic dealt with: Jean Dubuffet and the experience of raw art. Th
Corruption (Definition , Characteristics , Reasons , Features , and ways of combating it)
This research aims at making a comparative survey between the dry season in (2017-2018) and the wet season (2018-2019) in Iraq concerning the variation of rainfall and pressure systems responsible for such a difference. In this paper, seven climatological stations have been selected: Mosul, Kirkuk, Khanaqin, Baghdad, Rutba, Diwaniyah and Basra. Results have shown that the first category of rainfall of the two seasons has recorded a higher number of rainy days in comparison with the second and third categories with a total of 274 day in a dry season and 403 day of a wet season. Further, the total amount of the annual continuous rain is higher than the total of thunderstorms in a dry season as well as in the
... Show MoreThe focus of this work is on systematically understanding the effects of packing density of the sand grains on both the internal and bulk mechanical properties for strip footing interacting with granular soil. The studies are based on particle image velocimetry (PIV) method, coupled with a high resolution imaging camera. This provides valuable new insights on the evolution of slip planes at grain-scale under different fractions of the ultimate load. Furthermore, the PIV based results are compared with finite element method simulations in which the experimentally characterised parameters and constitutive behaviour are fed as an input, and a good level of agreements are obtained. The reported results would serve to the practicing engineers, r
... Show MoreSimplifying formulas that are used for calculations and design are the aim of researchers. For present work, the approach to distinguish the flow under sluice gate was conducted in a laboratory. The extensive experimental program was done to collect fifty-four data points for both free and submerged flow conditions. The data included different discharges, gate openings, flow depths at upstream as well as the flow depths represent a tail water and at a contracted section for downstream. The collected data are analyzed according to a problematic that may encounter in the field, to present a more straightforward (but with acceptable accurate) practical features equations and charts. Based on the proposed formulas, five meth
... Show More