Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreThree new hydrazone derivatives of Etodolac were synthesized and evaluated for their anti-inflammatory activity by using egg white induced paw edema method. All the synthesized target compounds were characterized by CHN- microanalysis, FT-IR spectroscopy, and 1HNMR analysis. The synthesis of the target (P1-P3) compounds was accomplished following multistep reaction procedures. The synthesized target compounds were found to be active in reducing paw edema thickness and their anti-inflammatory effect was comparable to that of the standard (Etodolac).
This study is conducted in order to, investigate the trophic state of Duhok Lake Dam located within Duhok city, Iraq. Water samples are collected seasonally from three monitored sites during 2011. The parameters used for assessing water quality and trophic status level include: water temperature, pH, EC, TDS, DO, BOD5, nutrients, Secchi disk transparency, and chlorophyll a. The results reveal that DO is above 5 mg.l-1 in all sites, BOD5 value is within permissible level for domestic uses. Water quality considered as a hard type. High sulfate concentration is recorded during the study period. Trophic state shows that water type is classified as mesotrophic during autumn season, while it is regarded as eutrophic in other seasons. TDN/TDP rati
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreA pioneering idea for increasing the thermal performance of heat transfer fluids was to use ultrafine solid particles suspended in the base fluid. Nanofluids, synthesized by mixing solid nanometer sized particles at low concentrations with the base fluid, were used as a new heat transfer fluid and developed a remarkable effect on the thermophysical properties and heat transfer coefficient. For any nanofluid to be usable in heat transfer applications, the main concern is its long-term stability. The aim of this research is to investigate the effect of using four different surfactants (sodium dodecyl benzene sulfonate (SDBS), sodium dodecyl sulfate (SDS), cetyl trimethylammonium bromide (CTAB), and gum Arabic (GA)), each with three different
... Show MoreObjective: The aim of this study was to develop a bioadhesive gel of gatifloxacin for the treatment of periodontal diseases.Methods: Periodontal gels of gatifloxacin were prepared using different hydrophilic polymers such as carbopol 940 (CP 940), carboxymethyl cellulose (CMC) and hydroxypropylmethyl cellulose (HPMC) in varied concentrations, either alone or as a combination. The prepared gels were evaluated for their physical appearance, pH, drug content, viscosity, bioadhesiveness and in vitro drug release profile. The influence of the type and the concentration of polymer on the drug release as well as on viscosity and mucoadhesiveness of prepared gels were investigated.Results: The prepared gels showed acceptable physical proper
... Show MoreFour new binuclear Schiff base metal complexes [(MCl2)2L] {M = Fe 1, Co 2, Cu 3, Sn 4, L = N,N’-1,4-Phenylenebis (methanylylidene) bis (ethane-1,2-diamine)} have been synthesized using direct reaction between proligand (L) and the corresponding metal chloride (FeCl2, CoCl2, CuCl2 and SnCl2). The structures of the complexes have been conclusively determined by a set of spectroscopic techniques (FT-IR, 1H-NMR, and mass spectra). Finally, the biological properties of the complexes have been investigated with a comparative approach against different species of bacteria (E. coli G-, Pseudomonas G-, Bacillus G+,
... Show MoreSoil pH is one of the main factors to consider before undertaking any agricultural operation. Methods for measuring soil pH vary, but all traditional methods require time, effort, and expertise. This study aimed to determine, predict, and map the spatial distribution of soil pH based on data taken from 50 sites using the Kriging geostatistical tool in ArcGIS as a first step. In the second step, the Support Vector Machines (SVM) machine learning algorithm was used to predict the soil pH based on the CIE-L*a*b values taken from the optical fiber sensor. The standard deviation of the soil pH values was 0.42, which indicates a more reliable measurement and the data distribution is normal.
With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More