Many purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to save much more details of the cover image and avoid any doubts that there is any secret information are hidden inside it. The quality of the stego-image and the extracted audio files are evaluated with the standard evaluation metric. The simulation results shown significant results of these metrics and achieve good imperceptibility and high security of the stego-image. The SNR and SPCC values are considered acceptance that means significant in terms quality and similarity of the reconstructed signal.
The reality of the field of construction projects in Iraq refers to needing for the development of performance in order to improve quality and reduce defects and errors and to control the time and cost, so there is needing for the application of effective methods in this area, one of the methods that can be applied in this area is the manner of Six Sigma. This research aims to enhance the performance and quality improvement for the construction projects by improving performance in the work of the implementation of the concrete structure depending on the Six Sigma methodology, and for the purpose of achieving the aim of the research, the researcher firstly depends on the theoretical study that include the concepts of qual
... Show MoreThe process of accurate localization of the basic components of human faces (i.e., eyebrows, eyes, nose, mouth, etc.) from images is an important step in face processing techniques like face tracking, facial expression recognition or face recognition. However, it is a challenging task due to the variations in scale, orientation, pose, facial expressions, partial occlusions and lighting conditions. In the current paper, a scheme includes the method of three-hierarchal stages for facial components extraction is presented; it works regardless of illumination variance. Adaptive linear contrast enhancement methods like gamma correction and contrast stretching are used to simulate the variance in light condition among images. As testing material
... Show MoreSummary Kidney transplantation is widely performed nowadays as an optimal treatment of end stage kidney diseases. Complications such as stenosis in graft renal arteries anastomosis may occur. Different suturing techniques are available for renal artery anastomosis. We aimed to compare the incidence of renal artery stenosis of the transplanted kidney when two suture techniques (continuous or interrupted) used for renal artery anastomosis. Therefore, a retrospectively comparative study was conducted on 44 patients managed with kidney transplantation during the years 2009-2011. Patients assigned into two groups; first group included 20 patients namely, continuous suture group, and the second group included 24 patients in whom the allograft art
... Show MoreThis research has come out with that strategies made by Porter as generally strategies applicable to any size and type of economic units cannot be applied to many of the economic units in the world in generally and in Iraq especially not a lot of economic units have the resources and competencies that enable them to provide a unique product of its kind in the minds of customers and then adopt a differentiation strategy and not a lot of economic units have the resources and competencies that make them the cost leader. Differentiators and cost leaders are minority in the world while not differentiators and not cost leaders are majority in the world.
The economic units are not differentiators and not c
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreAssessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,
... Show MoreThe study aimed to evaluate injuries and economic losses which caused by rose beetle Maladerainsanabilis (Brenske) on ornamental and fruit plants as introduced insect in Iraq during 2015 and determine infested host plants in addition to evaluate efficacy of pathogenic fungi Metarhiziumanisopiliae (1x10⁹ spore/ ml) and Beauvariabassiana (1x10⁸spore/ ml) in mortality of insect larvae in laboratory and field.The results showed that the insect was polyphagous infested many host plants (20 host plant)Which caused degradation and dead the plants through adult feeding on leaves and flower but large injury caused by larvae feeding on root plants which caused obligate dead to infested plant, the percentage mortality of rose plants 68.6%, pear
... Show MoreNanotechnology has shown a lot of promise in the oil and gas sectors, including nanoparticle-based drilling fluids. This paper aims to explore and assess the influence of various nanoparticles on the performance of drilling fluids to make the drilling operation smooth, cost effective and efficient. In order to achieve this aim, we exam the effect of Multi Wall Carbon Nanotube and Silicon Oxide Nanoparticles as Nanomaterial to prepare drilling fluids samples.
Anew method for mixing of drilling fluids samples using Ultra sonic path principle will be explained. Our result was drilling fluids with nano materials have high degree of stability.
The results of using Multiwall Carbon Nanotube and Silicon Oxide show t
... Show MoreThere is currently a pressing need to create an electro-analytical approach capable of detecting and monitoring genosensors in a highly sensitive, specific, and selective way. In this work, Functionalized Multiwall Carbon Nanotubes, Graphene, Polypyrrole, and gold nanoparticles nanocomposite (f-MWCNTs-GR-PPy-AuNP) were effectively deposited on the surface of the ITO electrode using a drop-casting process to modify it. The structural, morphological, and optical analysis of the modified ITO electrodes was carried out at room temperature using X-ray diffraction (XRD), field emission scanning electron microscopy (FE-SEM) images, atomic force microscopy (AFM) and Fourier transform infrared (FTIR) spectra. Cyclic voltammetry (CV) and electrochemi
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show More