In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secret message in high frequency. The proposed approach tested in different sizes of audio file and showed the success of hiding according to (PSNR) equation.
The green production of iron oxide nanoparticles (FeONPs) due to its numerous biotechnological uses has attracted a lot of attention and clean and eco-friendly approaches in the medical field.
The objectives of this study are to demonstrate the biogenic creation of FeONPs. The search for alternative antimicrobial medicines has been prompted by growing worries about multidrug resistance.
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreDrilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.
In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation
... Show MoreThis article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst
... Show MoreThis study was conducted to determine the ability of water treatment system (Vortisand) to reduce some chemical and physical properties for tigris river raw water, It consisted of turbidity, electrical conductivity, pH, total hardness, calcium Hardness as well as temperature in order to determine the unit`s efficiency for reducing their concentration as compared to those in the water produced by some classical potable water projects (Dora and Wathba) in Baghdad. Samples were collected during the cold months (December 2016 and January 2017) and during the hot months (May and June 2017). The results showed that this system has the ability to reduce some properties such as turbidity, the values were 215NTU in raw water and decreased to NTU
... Show MoreSummary Kidney transplantation is widely performed nowadays as an optimal treatment of end stage kidney diseases. Complications such as stenosis in graft renal arteries anastomosis may occur. Different suturing techniques are available for renal artery anastomosis. We aimed to compare the incidence of renal artery stenosis of the transplanted kidney when two suture techniques (continuous or interrupted) used for renal artery anastomosis. Therefore, a retrospectively comparative study was conducted on 44 patients managed with kidney transplantation during the years 2009-2011. Patients assigned into two groups; first group included 20 patients namely, continuous suture group, and the second group included 24 patients in whom the allograft art
... Show MoreThis research has come out with that strategies made by Porter as generally strategies applicable to any size and type of economic units cannot be applied to many of the economic units in the world in generally and in Iraq especially not a lot of economic units have the resources and competencies that enable them to provide a unique product of its kind in the minds of customers and then adopt a differentiation strategy and not a lot of economic units have the resources and competencies that make them the cost leader. Differentiators and cost leaders are minority in the world while not differentiators and not cost leaders are majority in the world.
The economic units are not differentiators and not c
... Show MoreOften phenomena suffer from disturbances in their data as well as the difficulty of formulation, especially with a lack of clarity in the response, or the large number of essential differences plaguing the experimental units that have been taking this data from them. Thus emerged the need to include an estimation method implicit rating of these experimental units using the method of discrimination or create blocks for each item of these experimental units in the hope of controlling their responses and make it more homogeneous. Because of the development in the field of computers and taking the principle of the integration of sciences it has been found that modern algorithms used in the field of Computer Science genetic algorithm or ant colo
... Show MoreThe aim of this study to identity using Daniel's model and Driver’s model in learning a kinetic chain on the uneven bars in the artistic gymnastics for female students. The researchers used the experimental method to design equivalent groups with a preand post-test, and the research community was identified with the students of the third stage in the college for the academic year 2020-2021 .The subject was, (3) class were randomly selected, so (30) students distributed into (3) groups). has been conducted pretesting after implementation of the curriculum for (4) weeks and used the statistical bag of social sciences(SPSS)to process the results of the research and a set of conclusions was reached, the most important of which is t
... Show More