Preferred Language
Articles
/
bsj-2085
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secret message in high frequency. The proposed approach tested in different sizes of audio file and showed the success of hiding according to (PSNR) equation.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Feb 27 2024
Journal Name
Tem Journal
Supervised Classification Accuracy Assessment Using Remote Sensing and Geographic Information System
...Show More Authors

Assessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Dec 10 2018
Journal Name
Day 1 Mon, December 10, 2018
Wellbore Trajectory Optimization Using Rate of Penetration and Wellbore Stability Analysis
...Show More Authors

Drilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.

In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation

... Show More
View Publication
Crossref (11)
Crossref
Publication Date
Fri Sep 16 2022
Journal Name
Sustainability
Intellectual Capital History and Trends: A Bibliometric Analysis Using Scopus Database
...Show More Authors

This article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst

... Show More
View Publication Preview PDF
Scopus (75)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Tue Jan 23 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ESTIMATION OF SOME CHEMICAL AND PHYSICAL PROPERTIES USING A WATER TREATMENT UNIT VORTISAND COMPARED TO THEIR CONCENTRATION IN WATER PRODUCED BY TRIDINTINAL DRINKING WATER PROJECTS IN BAGHDAD.: ESTIMATION OF SOME CHEMICAL AND PHYSICAL PROPERTIES USING A WATER TREATMENT UNIT VORTISAND COMPARED TO THEIR CONCENTRATION IN WATER PRODUCED BY TRIDINTINAL DRINKING WATER PROJECTS IN BAGHDAD.
...Show More Authors

This study was conducted to determine the ability of water treatment system (Vortisand) to reduce some chemical and physical properties for tigris river raw water, It consisted of turbidity, electrical conductivity, pH, total hardness, calcium Hardness as well as temperature in order to determine the unit`s efficiency for reducing their concentration as compared to those in the water produced by some classical potable water projects (Dora and Wathba) in Baghdad. Samples were collected during the cold months (December 2016 and January 2017) and during the hot months (May and June 2017). The results showed that this system has the ability to reduce some properties such as turbidity, the values were 215NTU in raw water and decreased to NTU

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 01 2021
Journal Name
Journal Of Medical And Surgical Practice
Incidence of Stenosis in Graft Renal Arteries Anastomosis in Kidney Transplantation Using Two Different Techniques
...Show More Authors

Summary Kidney transplantation is widely performed nowadays as an optimal treatment of end stage kidney diseases. Complications such as stenosis in graft renal arteries anastomosis may occur. Different suturing techniques are available for renal artery anastomosis. We aimed to compare the incidence of renal artery stenosis of the transplanted kidney when two suture techniques (continuous or interrupted) used for renal artery anastomosis. Therefore, a retrospectively comparative study was conducted on 44 patients managed with kidney transplantation during the years 2009-2011. Patients assigned into two groups; first group included 20 patients namely, continuous suture group, and the second group included 24 patients in whom the allograft art

... Show More
Preview PDF
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Target Costing in Implementation Confrontational Strategy Applied study in General Company for Electronic Industries
...Show More Authors

This research has come out with that strategies made by Porter as generally strategies applicable to any size and type of economic units cannot be applied to many of the economic units in the world in generally and in Iraq especially not a lot of economic units have the resources and competencies that enable them to provide a unique product of its kind in the minds of customers and then adopt a differentiation strategy  and not a lot of economic units have the resources and competencies that make them the cost leader. Differentiators and cost leaders are minority in the world while not differentiators and not cost leaders are majority in the world.

The economic units are not differentiators and not c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 10 2016
Journal Name
ألمؤتمر الدولي العلمي الخامس للاحصائيين العرب/ القاهرة
Proposition of Modified Genetic Algorithm to Estimate Additive Model by using Simulation
...Show More Authors

Often phenomena suffer from disturbances in their data as well as the difficulty of formulation, especially with a lack of clarity in the response, or the large number of essential differences plaguing the experimental units that have been taking this data from them. Thus emerged the need to include an estimation method implicit rating of these experimental units using the method of discrimination or create blocks for each item of these experimental units in the hope of controlling their responses and make it more homogeneous. Because of the development in the field of computers and taking the principle of the integration of sciences it has been found that modern algorithms used in the field of Computer Science genetic algorithm or ant colo

... Show More
Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of Sport Science Technology And Physical Activities
The effect of using Daniel's model and Driver’s model in learning a kinetic chain on the uneven bars in the artistic gymnastics for female students
...Show More Authors

The aim of this study to identity using Daniel's model and Driver’s model in learning a kinetic chain on the uneven bars in the artistic gymnastics for female students. The researchers used the experimental method to design equivalent groups with a preand post-test, and the research community was identified with the students of the third stage in the college for the academic year 2020-2021 .The subject was, (3) class were randomly selected, so (30) students distributed into (3) groups). has been conducted pretesting after implementation of the curriculum for (4) weeks and used the statistical bag of social sciences(SPSS)to process the results of the research and a set of conclusions was reached, the most important of which is t

... Show More
View Publication Preview PDF