APDBN Rashid, International Journal of Humanities and Social Sciences/ RIMAK, 2023
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreWith the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and s
... Show MoreIn this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A compari
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreIn this search, Ep/SiO2 at (3, 6, 9, 12 %) composites is prepared by hand Lay-up method, to measure the change in the thermal conductivity and Impact Strength of epoxy resin before and after immersion in H2SO4 Solution with a 0.3N for 10 days. The results before immersion decreases with the increase of the weight ratios of the reinforcement material (SiO2), It changed from (82.6×10-2 to 38.7×10-2 W/m.°C) with change weight ratios from (3 to 12) % respectively, but after immersion time in the chemical solution where it was (65.6×10-2 W/m.°C) at the weight ratios (6 %) and became (46.6 × 10-2 W/m.°C) after immersion in sulfuric acid. The results of the Impact strength decreased by increasing the percentage weight ratio, it changed f
... Show MoreAbstract
The aim of the research is to identify the level of awareness and emotional experience among university students and to identify the effect of the educational program based on (Guttmann) model for developing awareness and emotional experience among university students by verifying the validity of the following zero hypotheses: 1) There are no statistically significant differences in the development of awareness and emotional experience among university students at the level of (0.05) between the mean scores of the experimental group in the pre and post-tests. 2) There are no statistically significant differences in the development of awareness and emotional experience among university students at the lev
... Show MoreThe design was distinguished in Late Twenty-First Century With new and new methods Through which the ability to adapt all technical media in the formation of two-dimensional and three-dimensional figures and shapes was achieved .
Which led to the emergence of endless sets of design ideas characterized by the heterogeneity of design forms and design solutions that preceded it. The designer could not access these creations in various architectural and artistic fields only through computer programs, especially those related to the activation of mathematical logic and what is known as algorithms in the formation and construction of the form, which led to the emergence of the "parametric direction" and the problem of research is summarized
Abstract
The vegetative filter strips (VFS) are a useful tool used for reducing the movement of sediment and pesticide in therivers. The filter strip’s soil can help in reducing the runoff volume by infiltration. However, the characteristics of VFS (i.e., length) are not recently identified depending on the estimation of VFS modeling performance. The aim of this research is to study these characteristics and determine acorrelation between filter strip length and percent reduction (trapping efficiency) for sediment, water, and pesticide. Two proposed pesticides(one has organic carbon sorption coefficient, Koc, of 147 L/kg which is more moveable than XXXX, and another one
... Show More