Preferred Language
Articles
/
alkej-103
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested system used self crypto-hiding pseudo random key generator. The auto-key generator has purposes to investigate the encryption and embedding processes .The hiding results shows no noise in the stego-wave file after embedding process, also no difference in size is found between the original wave audio file and stego-wave file.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
Risk Response in Construction Project: A Review Study
...Show More Authors

Construction projects are characterized as projects with multi phases and activities, complex, unique, and have many different parties and stakeholders. Risks could appear at one or more of the construction project stages and may affect the achievement of project objectives. Therefore, one of the key elements in the planning phase of any project is the risk management process (RMP). This study attempts to understand the terminology of risk in general, risk management, and response to risk in particular. This study is mainly a review of thirty-eight studies that have been published between 1997 and 2020 that demonstrate the importance of the crucial phase of risk response from the risk management process and its impact on

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Wearable Detection Systems for Epileptic Seizure: A review
...Show More Authors

The seizure epilepsy is risky because it happens randomly and leads to death in some cases. The standard epileptic seizures monitoring system involves video/EEG (electro-encephalography), which bothers the patient, as EEG electrodes are attached to the patient’s head.

Seriously, helping or alerting the patient before the seizure is one of the issue that attracts the researchers and designers attention. So that there are spectrums of portable seizure detection systems available in markets which are based on non-EEG signal.

The aim of this article is to provide a literature survey for the latest articles that cover many issues in the field of designing portable real-time seizure detection that includes the use of multiple

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Lung Cancer in a Sample of Iraqi Patients
...Show More Authors

Background: Lung cancer is responsible for the most
cancer deaths in both men and women throughout the
world. Deaths from lung cancer (160,440 in 2004,
according to the National Cancer Institute) exceed the
number of deaths from four other major cancers combined
(breast, colon, pancreatic and prostate).
Objective: To assess the behavior and the approaches of
lung cancer in a sample of Iraqi patients.
Methods: This descriptive retrospective study was
performed using the records of 390 patients proved to have
lung cancer that had attending the Thoracic Surgery
Department of Surgical Specialties Hospital-Medical City
\Baghdad for the period from January, 1st
, 2001 to
December, 31st
,2002.
Res

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Global Journal Of Public Health Medicine
DEXAMETHASONE USE IN MANAGEMENT OF COVID19: A REVIEW
...Show More Authors

The lack of active 2019 coronavirus disease (COVID-19) pandemic treatment creates a challenge for researchers and scientists to find the most appropriate treatment for this disease. Dexamethasone, according to the findings of the RECOVERY clinical trial, declared mid-June 2020 in print media was one of those therapies. Although the results from retrospective studies are not strongly supportive of corticosteroid routine use in COVID-19 despite the signals for some benefits, the dedicated RECOVERY trial found a significant reduction in death with dexamethasone only in severe cases on a ventilator or moderate cases on supplemental oxygen therapy nevertheless, no benefit observed in mild to moderate cases requiring no oxygen. More studi

... Show More
View Publication
Crossref
Publication Date
Sun Dec 01 2024
Journal Name
مجلة كلية التربية للبنات/ الجامعة العراقية
HURIER Model as a Model in Language Teaching
...Show More Authors

Between the 1980s and 1990s, the HURIER model was developed by Brownell and consist of six interrelated components, which are represented in these acronyms (Hearing, Understanding, Remembering, Interpreting, Evaluating, and Responding). This model can be considered as a framework of the behavioral approach which can be used to improve students’ listening performance and to foster a positive attitude toward listening. Many learners find it challenging to improve their listening skills when learning a second or foreign language because it requires the integration of both listening and speaking. Consequently, enhancing this skill will help students improve other language skills, including reading, speaking, and writing. The HURI

... Show More
Publication Date
Thu Nov 01 2001
Journal Name
Renewable Energy
Optoelectronic properties of a-Si1−xGex:H thin films
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Dec 29 2014
Journal Name
Information And Knowledge Management
Applying Electronic Commerce for a Proposed Virtual Organization
...Show More Authors

Virtual organization is similar to traditional organization in principles, but is different in the ways it operates. It requires small creation costs compared to the traditional and it uses electronic commerce as the market place and distribution channel for its products and services.The aim of this article is to applying electronic commerce for a proposed virtual organization. The tools used to build an effective web application for virtual organization to provide virtual environment to the customers to do the transaction activities online include PHP, MySQL and Apache. HTML is used for displaying forms and tables and JavaScript is used for verification in client side. Finally, connecting it to 2Checkout.com company as a third party to per

... Show More
Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
International Journal Of Research In Social Sciences And Humanities
Black Lives Matter in Brother: A Postcolonial Perspective
...Show More Authors

This study aims to examine how the lives of blacks are reduced and eliminated in Brother (2017) by David Chariandy. Black Lives Matter is a hash tag that appears after the killing of Trayvon Martin (17 years old African American) in 2012 by the savage hands of George Zimmerman (white person). This hash-tag has become a social movement that calls for equality in order to stop the violence against black people because their live is as valuable as white’s. The movement comes into being to highlight the “hypocritical democracy in service to the white males whose freedom are openly depended upon the oppression of blacks” (Lebron, 2017, P. 1). Those who have started this movement try to redeem a state and its arbitrary actions again

... Show More
View Publication
Crossref
Publication Date
Wed May 12 2021
Journal Name
Journal Of Biotechnology Research Center
A review of the Common Food-borne Viruses
...Show More Authors

Preview PDF