Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreIn this paper, we study the incorporation of the commensalism interaction and harvesting on the Lotka–Volterra food chain model. The system provides one commensal prey, one harvested prey, and two predators. A set of preliminary results in local bifurcation analysis around each equilibrium point for the proposed model is discussed, such as saddle-node, transcritical and pitchfork. Some numerical analysis to confirm the accruing of local bifurcation is illustrated. To back up the conclusions of the mathematical study, a numerical simulation of the model is carried out with the help of the MATLAB program. It can be concluded that the system's coexistence can be achieved as long as the harvesting rate on the second prey population is
... Show MoreIn this paper, we define a cubic bipolar subalgebra, $BCK$-ideal and $Q$-ideal of a $Q$-algebra, and obtain some of their properties and give some examples. Also we define a cubic bipolar fuzzy point, cubic bipolar fuzzy topology, cubic bipolar fuzzy base and for each concept obtained some of its properties.
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreBy optimizing the efficiency of a modular simulation model of the PV module structure by genetic algorithm, under several weather conditions, as a portion of recognizing the ideal plan of a Near Zero Energy Household (NZEH), an ideal life cycle cost can be performed. The optimum design from combinations of NZEH-variable designs, are construction positioning, window-to-wall proportion, and glazing categories, which will help maximize the energy created by photovoltaic panels. Comprehensive simulation technique and modeling are utilized in the solar module I-V and for P-V output power. Both of them are constructed on the famous five-parameter model. In addition, the efficiency of the PV panel is established by the genetic algorithm
... Show MoreThe increasing Global Competitive and the continuous improvement in information technology has led the way to the development of the modern systems and using modern techniques. One of these techniques is benchmarking style and Total Quality Management all of them are used to improve the production process and target rid from the losts on the other side.
The Benchmarking style has become a very important for all the industrial systems and the serving systems as well. And an instrument to improve their performance specially those which are suffering from the highness of the costs or waste in time on the other side.
This study aims to depend on virtual Benchmarking style in the eval
... Show MoreThe game of volleyball, like all other sports, has been made by new amendments, the most important of which is the system of what is not the system of the free player in 1998, which gave added importance to the skills of receiving the transmission and defending the stadium being one of the important skills where the law allowed the free player to move and position in the back positions of the stadium Limited support mainly defensive skills. This is to make the state of stability and balance between defensive and offensive skills, which helps in the development of the game and make it exciting and enjoyable for players and fans. Therefore, the researchers decided to shed light by identifying the percentage of the contribution of the free pla
... Show MoreOil from Brassca campestris (local variety) was extracted with hexane using Soxhlet. The extracted oil was characterized and its antimicrobial activity was determined as well. The content of extracted oil was 40% with 0.5% of volatile oil .Oil was immiscible with polar solvent such as ethanol, acetone and water, while it was easily miscible with chloroform due to its hydrophobicity. The result of organoleptic tests revealed that the oil is clear yellow in color and odorless with acceptable taste. The oil was stable at 4 -25 C? for a month. Refractive index (RI) of oil was 1.4723 with density of 0.914, [both at 4-25 C?]. Boiling point 386 C?. Infra red spectroscopy (IR) indicated the presence of different chemical groups (C=C
... Show MoreThiamethoxam is a synthetic organic insecticide belong to The most significant new class of pesticides created in the last thirty years is neonicotinoids. This study's objective was to determine the effect of thiamethoxam, lambda cyhalothrin and their combination on biochemical parameters, the levels of free radicals and enzymes activities liver of male.Forty Rats ( 150-170 g ) were used. animals Were separated into four groups, each with ten rats.The Gp1 was used as control, the Gp2 was used to study the effect of thiamethoxam for 3weeks, the Gp3 was employed to examine the impact of lambda cyhalothrin for 3 weeks and the Gp4 was used to research the impact of thiamethoxam and lambda cyhalothrin for 3 weeks. thiamethoxam and/or lambda cyha
... Show More