Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods in terms of average segmental SNR, number of failing samples, and Czekanowski Distance (CZD). In addition, the proposed method shows the ability to operate with large message sizes (up to half of carrier size) with graceful degradation as opposed to the other methods which fail at large message size. So, the proposed method provides more flexibility in message and carrier sizes while preserving high efficiency.
This research aims at making a comparative survey between the dry season in (2017-2018) and the wet season (2018-2019) in Iraq concerning the variation of rainfall and pressure systems responsible for such a difference. In this paper, seven climatological stations have been selected: Mosul, Kirkuk, Khanaqin, Baghdad, Rutba, Diwaniyah and Basra. Results have shown that the first category of rainfall of the two seasons has recorded a higher number of rainy days in comparison with the second and third categories with a total of 274 day in a dry season and 403 day of a wet season. Further, the total amount of the annual continuous rain is higher than the total of thunderstorms in a dry season as well as in the
... Show MoreWatermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreThe current study was conducted with an aim to know the effect of adding different concentrations of pomegranate peels alcoholic extract (PPAE) on the traits of Awassi ram semen stored at 5°C. Eight ejaculations from three Awassi rams were collected, mixed and diluted with TRIS extender. The semen samples were divided into four equal parts, and then the alcoholic extract of pomegranate peels was added at concentrations of 0, 100, 200 and 300 mg/ 1 ml of extender, which represented each of the treatments C, T1, T2 and T3, respectively. The samples were stored at 5 ° C and semen examinations were performed during periods 0, 24, 48, 72 and 96 hours after collection. Semen traits included calculation percentage of individual motility, viabili
... Show MoreThe study was reflection of the impact of the widespread use of polymer Novolak composite reinforced Glass fiber and Asbestos fiber once again with weight fraction 60% on the physical properties, which included (Hardness, Compressive deformation, compressive modulus of elasticity, Flexural modulus of elasticity, Resilience modulus, the maximum of Flexural strength, Flexural strain energy and Shear strength inner layers); it is known how much important the media as a source of bacterial contamination, which contributes directly or indirectly in the process of aging of these materials. These Novolak composite reinforced, prepared by weight fraction of (10%) and (14%) of the Hexamethylene-tetraamine (HMTA) hardener material. It
... Show MoreAbstract Rasha Hameid Jehad Baghdad University Background: The high reactivity of hydrogen peroxide used in bleaching agents have raised important questions on their potential adverse effects on physical properties of restorative materials. The purpose of this in vitro study was to evaluate the effect of in-office bleaching agents on the microhardness of a new Silorane-based restorative material in comparison to methacrylate-based restorative material. Materials and method: Forty specimens of Filtek™ P90 (3M ESPE,USA) and Filtek™ Supreme XT (3M ESPE, USA) of (8mm diameter and 3m height) were prepared. All specimens were polished with Sof-Lex disks (3M ESPE, USA). All samples were rinsed and stored in incubator 37˚C for 24 ho
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreA statistical study was made to know the characteristics of Decametric (DAM) emission emitted from Jupiter's planet. These characteristics are the sporadic nature, time, type and the frequency. Period of 11 years was taken to study the first and year 2004 was taken to study the others. Data were provided from Radio Jove project, which gave information about the observer's location, date, time, type and the frequency. The results indicated that the DAM emission was sporadic, the time was between (00:01-05:31) hour, it was found that (Io-B) is the largest number, as compared with others , a large number emission occurred at frequency range (20-21) MHz. The results were compared with results of Radio Jove software, which indicated that the DAM
... Show MoreThe present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.
The fetal heart rate (FHR) signal processing based on Artificial Neural Networks (ANN),Fuzzy Logic (FL) and frequency domain Discrete Wavelet Transform(DWT) were analysis in order to perform automatic analysis using personal computers. Cardiotocography (CTG) is a primary biophysical method of fetal monitoring. The assessment of the printed CTG traces was based on the visual analysis of patterns that describing the variability of fetal heart rate signal. Fetal heart rate data of pregnant women with pregnancy between 38 and 40 weeks of gestation were studied. The first stage in the system was to convert the cardiotocograghy (CTG) tracing in to digital series so that the system can be analyzed ,while the second stage ,the FHR time series was t
... Show More