Preferred Language
Articles
/
alkej-103
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested system used self crypto-hiding pseudo random key generator. The auto-key generator has purposes to investigate the encryption and embedding processes .The hiding results shows no noise in the stego-wave file after embedding process, also no difference in size is found between the original wave audio file and stego-wave file.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 01 2024
Journal Name
Iraqi Journal Of Oil And Gas Research (ijogr)
Comparative study of electrochemical oxidation system hybrid with photocatalytic system for the treatment of Al-Najaf petroleum refinery wastewater
...Show More Authors

View Publication
Crossref
Publication Date
Fri Aug 20 2021
Journal Name
Iraqi Journal Of Laser
Laser Biostimulation Effect on Human Sperm Motility
...Show More Authors

Background: Sperm motility disorder is an important cause of infertility in male, and one of the causes of reduced motility of the sperm is the disorders of the mitochondria because it provides the required energy for sperm motility, Laser biostimulation or low-level laser therapy has a positive effect on the mitochondria and led to increasing the synthesis of ATP. Method: Twenty fresh human semen samples were used in this research study, each sample was separated into two portions, one was used as control which is not exposed to the laser beam and the other was irradiated with the wavelength of 410 nm diode laser with an output power of 100 mW and an exposure time of 60 seconds, then the measurement of

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Temperature Effect on Photovoltaic Modules Power Drop
...Show More Authors

 Abstract

In order to determine what type of photovoltaic solar module could best be used in a thermoelectric photovoltaic power generation. Changing in powers due to higher temperatures (25oC, 35oC, and 45oC) have been done for three types of solar modules: monocrystalline , polycrystalline, and copper indium gallium (di) selenide (CIGS). The Prova 200 solar panel analyzer is used for the professional testing of three solar modules at different ambient temperatures; 25oC, 35oC, and 45oC and solar radiation range 100-1000 W/m2. Copper indium gallium (di) selenide module   has the lowest power drop (with the average percent

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 05 2024
Journal Name
Shifaa
Evaluating alveolar bone thickness in upper and lower incisors from orthodontic perspective. A Cone beam computed tomography-based retrospective study
...Show More Authors

Purpose: This study aimed to assess the thickness of alveolar bone of maxillary and mandibular incisors from orthodontics perspective. Materials and Method: A total of 73 Cone beam computed tomography for Iraqi patients (47 females and 26 males) were included in this study. The selected images were captured and imported to AutoCAD database software to perform the measurement. To measure alveolar bone thickness, a reference line was drawn through the long axis of each incisor, from the incisal edge to the root apex. Then, labial and lingual/palatal perpendicular lines were drawn to the reference line at 3, 6, and 9mm apically from the cemento-enamel junction (CEJ). Results: The buccal bone is generally thinner than the lingual/palata

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Molecular Structure
Synthesis, structural investigations, XRD, DFT, anticancer and molecular docking study of a series of thiazole based Schiff base metal complexes
...Show More Authors

A novel Schiff base (SB) ligand, abbreviated as HDMPM, resulted from the condensation of 2-amino-4-phenyl-5-methyl thiazole and 4-(diethylamino)salicyaldehyde, and its metal complexes with [Co(II), Cu(II), Ni(II), and Zn(II)] ions in high yield were formed. The physico-chemical techniques such as elemental analysis, molar conductance, IR, 1H and 13C NMR, mass spectroscopy, and electronic absorption studies were utilized to characterize the synthesized compounds. The studied compounds were examined for their possible anticancer activity against a number of human cancerous cell lines, including A549 lung carcinoma, HepG2 liver cancer, HCT116 colorectal cancer, and MCF-7 breast cancer cell lines, with doxorubicin serving as the standard. The s

... Show More
View Publication
Scopus (33)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Fri Jun 02 2023
Journal Name
East European Journal Of Physics
Electroexcitation Form Factors and Deformation of 20,22Ne Isotopes Based on the Shell Model and Hartree-Fock plus BCS Calculations
...Show More Authors

Nuclear structure of 20,22Ne isotopes has been studied via the shell model with Skyrme-Hartree-Fock calculations. In particular, the transitions to the low-lying positive and negative parity excited states have been investigated within three shell model spaces; sd for positive parity states, spsdpf large-basis (no-core), and zbme model spaces for negative parity states. Excitation energies, reduced transition probabilities, and elastic and inelastic form factors were estimated and compared to the available experimental data. Skyrme interaction was used to generate a one-body potential in the Hartree-Fock calculations for each selected excited states, which is then used to calculate the single-particle matrix elements. Skyrme interac

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Bayesian and non-Bayesian estimation of the lomax model based on upper record values under weighted LINEX loss function
...Show More Authors

In this article, we developed a new loss function, as the simplification of linear exponential loss function (LINEX) by weighting LINEX function. We derive a scale parameter, reliability and the hazard functions in accordance with upper record values of the Lomax distribution (LD). To study a small sample behavior performance of the proposed loss function using a Monte Carlo simulation, we make a comparison among maximum likelihood estimator, Bayesian estimator by means of LINEX loss function and Bayesian estimator using square error loss (SE) function. The consequences have shown that a modified method is the finest for valuing a scale parameter, reliability and hazard functions.

View Publication
Scopus (9)
Scopus
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Educational Program Based on the (Guttmann) Model for Developing Awareness and Emotional Experience among University Students
...Show More Authors

Abstract

The aim of the research is to identify the level of awareness and emotional experience among university students and to identify the effect of the educational program based on (Guttmann) model for developing awareness and emotional experience among university students by verifying the validity of the following zero hypotheses: 1) There are no statistically significant differences in the development of awareness and emotional experience among university students at the level of (0.05) between the mean scores of the experimental group in the pre and post-tests. 2) There are no statistically significant differences in the development of awareness and emotional experience among university students at the lev

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (22)
Crossref (12)
Scopus Crossref