In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secret message in high frequency. The proposed approach tested in different sizes of audio file and showed the success of hiding according to (PSNR) equation.
Corrosion experiments were carried out to investigate the effect of several operating parameters on the corrosion rate and corrosion potential of carbon steel in turbulent flow conditions in the absence and presence of sodium benzoate inhibitor using electrochemical polarization technique. These parameters were rotational velocity (0 - 1.57 m/s), temperature (30oC – 50oC), and time. The effect of these parameters on the corrosion rate and inhibition efficiency were investigated and discussed. It was found that the corrosion rate represented by limiting current increases considerably with increasing velocity and temperature and that it decreased with time due to the formation of corrosion product layer. The corrosion potential shifted t
... Show MoreNGC 6946 have been observed with BVRI filters, on October 15-18,
2012, with the Newtonian focus of the 1.88m telescope, Kottamia
observatory, of the National Research Institute of Astronomy and
Geophysics, Egypt (NRIAG), then we combine the BVRI filters to
obtain an astronomical image to the spiral galaxy NGC 6946 which
is regarded main source of information to discover the components of
this galaxy, where galaxies are considered the essential element of
the universe. To know the components of NGC 6946, we studied it
with the Variable Precision Rough Sets technique to determine the
contribution of the Bulge, disk, and arms of NGC 6946 according to
different color in the image. From image we can determined th
Fiscal policy is one of the important economic tools that affect economic development in general and human development in particular through its tools (public revenues, public expenditures, and the general budget).
It was hoped that the effects of fiscal policy during the study period (2004-2007) will positively reflect on human development indicators (health, education, income) by raising these indicators on the ground. After 2003, public revenues in Iraq increased due to increased revenues. However, despite this increase in public budgets, the actual impact on human development and its indicators was not equivalent to this increase in financial revenues. QR The value of the general budget allocations ha
... Show MoreThis article reviews the technical applicability of nanofiltration membrane process for the removal of nickel, lead, and copper ions from industrial wastewater.
Synthetic industrial wastewater samples containing Ni(II), Pb(II), and Cu(II) ions at various concentrations (50, 100, 150 and 200 ppm), under different pressures (1, 2, 3 and 4 bar), temperatures (10, 20, 30 and 40 oC), pH (2, 3, 4, 5 and 5.5), and flow rates (1, 2, 3 and 4 L/hr), were prepared and subjected treated by NF systems in the laboratory. Suitable NF membrane was chosen after testing a number of NF membranes (University of Technology-Baghdad), in terms of production and removal. NF system was capable of removing more than (85%, 78%, and 66% for Ni(II
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThis research is a case study to solve control problems in Al Rasheed edible oil factory fire tube boilers. they have hopes to develop a new control system to manage boilers operation. The suggestion is to use Zelio soft programmable relays instead of the unavailable old control units. Operation philosophy was studied through works of literature, operation manuals, and standards. Programmable logic control relay is proposed as an advanced selection than PLC's. Boilers operation is accompanied by operation risks. many boilers were exploded in Iraq for different reasons. Some problems are attributed to manual operation mistakes. Extensive work was done to understand the operation sequence, emergency shutdown, and faults causing the trips. A c
... Show MoreIn current study a computation fluid dynamic (CFD) technique was used to investigate the effect of groynes shape and spacing on the scour pattern and the maximum scour depth in open channel flow. CFD model have been validated throughout comparing the numerical results with three previous experimental studies for a single groyne located in open channel with three different shapes (L, quadrant, and parabola shapes). The comparison revealed very good agreement between numerical results of the maximum scour depth with the results of all experimental models. Moreover, investigations of the effect of multi-groynes (three groynes and four groynes) arranged in parallel with constant spacing and also with variable spacing have been done, the
... Show MoreIn this work, a local sunflower husk (SFH) was used as a natural surface for removing Basic Green-4 (BG4) dye, as a watersoluble pollutant. The effect of initial concentration, contact time, the mass of surface of the dye with the SFH as well as the medium temperature was studied. The application of Langmuir, Freundlich isotherms on the collected data of the adsorption process found to harmonize to Freundlich equation more than that of Langmuir. However, the adsorbed mass of BG4 dye showed a direct increase with the increase of SFH mass and equilibrium was achieved within a 60min window. The interaction of BG4 with SFH surface was spontaneous and exothermic. The empirical kinetic outcomes at ambient temperatures were applied to pseudo 1st a
... Show MoreWater quality sensors have recently received a lot of attention due to their impact on human health. Due to their distinct features, environmental sensors are based on carbon quantum dots (CQDs). In this study, CQDs were prepared using the electro-chemical method, where the structural and optical properties were studied. These quantum dots were used in the environmental sensor application after mixing them with three different materials: CQDs, Alq3 polymer and CQDs and Alq3 solutions using two different methods: drop casting and spin coating, and depositing them on silicon. The sensitivity of the water pollutants was studied for each case of the prepared samples after measuring the change in resistance of the samples at a temperature of
... Show More