In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreTechnology is an important factor for achieving architecture as an impact and vulnerability. It represents one of the significant elements in creating the intellectual framework, as well as having its own intellectual breakdown, while values constitute the most important and obviously factor of the community's intellectual. Research aims was determined accordingly by: investigating the role and impact of values and their relationship to technology in architecture.
In this context, the research investigated values and technology in architecture, through discussing their aspects and dimensions in architecture. In the context of values, the research discussed their concept and the related ones to have a concrete def
... Show MoreBackground: The discriminative power of the classical WHO parameters in relation to male fertility is quite low, because they only address few aspects of sperm quality and function. This has led investigators to focus their attention on the male gamete and in particular its genome.Objective: To explore which of the sperm DNA damage parameters measured by comet assay are more reliable, and their relations with the standard semen parameters.Methods: Study was done on 40 infertile men selected from couples attending the Institute of Embryo Reasearch and Infertility Treatment at Al-Kadhimiya City/ Baghdad in the period between February 2009 and May 2009, with a history of infertility of ≥1 years; and 15 healthy volunteers of proven fertili
... Show MoreThe research investigates the term innovation and its role in elaborating architectural practice based on diffusion. The complexity of the architectural field compared with other fields shows a problem in explaining how innovations in architecture diffuse as a thought and act in a certain context of practice. Therefore, the research aims to build an intellectual model that explains the way personal thoughts resembled by unique models introduced by creative and innovator designers diffuse in a certain pattern elaborate these models into a state of prevailing thought resembled by the movement in architecture. The research will apply its model to the more comprehensive movement in architecture, which is the modern movement,
... Show MoreIt is noted in the title that the paper studies the viewpoint in the novel The Dog and the Long Night by the Iranian novelist Shahranoush Parsi Pour and in the novel Alibaba's Sad Night by the Iraqi novelist Abdulkhaliq Ar-Rikabi. Both are well known novelists, and about whose stories and novels many critical books, MA theses, and Ph.D. dissertations have been written. Also, some of their literary works have won prizes. Here, the researcher shed light on the concept of viewpoint, its types, and its importance in novels in general. This was done along with tackling the two viewpoints in both novels, where similarities and differences were identified. For this end, the researcher has adopted the analytic-descriptive appro
... Show MoreThe research work is "The passive voice as a grammatical phenomenon in four selected textbooks". The research deals with the grammatical phenomenon passive in German. The research consists of two parts, the theoretical and the empirical part. The present research work is divided into 3 sections:
The first section includes the definition of passive, passive types, process passive, state passive, passive with modal verbs, and other types of passive. The second section provides illustrations of the four selected textbooks. The third chapter presents the passive voice in textbooks, namely German language teaching for foreigners by Dora Schulz and Heinz Griesbach, Delfin von Aufderstrasse H. and others, Em von Balme, M. and others and
... Show MoreIn this work, the effects of size, and temperature on the linear and nonlinear optical properties in InGaN/GaN inverse parabolic and triangular quantum wells (IPQW and ITQW) for different concentrations at the well center were theoretically investigated. The indium concentrations at the barriers were fixed to be always xmax = 0.2. The energy levels and their associated wave functions are computed within the effective mass approximation. The expressions of optical properties are obtained analytically by using the compact density-matrix approach. The linear, nonlinear, and total absorption coefficients depending on the In concentrations at the well center are investigated as a function of the incident photon energy for different
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreIn this study, a mathematical model for the kinetics of solute transport in liquid membrane systems (LMSs) has been formulated. This model merged the mechanisms of consecutive and reversible processes with a “semi-derived” diffusion expression, resulting in equations that describe solute concentrations in the three sections (donor, acceptor and membrane). These equations have been refined into linear forms, which are satisfying in the special conditions for simplification obtaining the important kinetic constants of the process experimentally.
Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show More