In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secret message in high frequency. The proposed approach tested in different sizes of audio file and showed the success of hiding according to (PSNR) equation.
Coblatcomplex has been prepared by reaction between C16H19N3O3S (L) as ligand and metal salt (II). The prepared complex were characterized by infrared spectra, electromic spectra, magnetic susceptibility, molar conductivity measurement and metal analysis by atomic absorption and (C.H.N) analysis. From these studies tetrahedral geometry structure for the complex was suggested. The photodegredation of complex were study using photoreaction cell and preparednanoTiO2 catalyst in different conditions (concentration, temperatures, pH).The results show that the recation is of a first order with activation energy equal to (6.6512 kJ /mol).
Segmentation is the process of partition digital images into different parts depending on texture, color, or intensity, and can be used in different fields in order to segment and isolate the area to be partitioned. In this work images of the Moon obtained through observations in Astronomy and space dep. College of science university of Baghdad by ( Toward space telescopes and widespread used of a CCD camera) . Different segmentation methods were used to segment lunar craters. Different celestial objects cause craters when they crash into the surface of the Moon like asteroids and meteorites. Thousands of craters appears on the Moon's surface with ranges in size from meter to many kilometers, it provide insights into the age and geology
... Show MoreThrough the last decade, Integrated Project Delivery (IPD) methodology considers one of the new contractual relations that are also on the way to further integrate the process of combining design and instruction. On the other hand, Building Information Modeling (BIM) made significant advancements in coordinating the planning and construction processes. It is being used more often in conjunction with traditional delivery methods. In this paper, the researcher will present the achievement of IPD methodology by using BIM through applying on the design of the financial commission building in Mayssan Oil Company in Iraq. The building has not been constructed yet and it was designed by usin
Cladophora and Spirulina algae biomass have been used for the removal of Tetracycline (TC) antibiotic from aqueous solution. Different operation conditions were varied in batch process, such as initial antibiotic concentration, different biomass dosage and type, contact time, agitation speed, and initial pH. The result showed that the maximum removal efficiencies by using 1.25 g/100 ml Cladophora and 0.5 g/100 ml Spirulina algae biomass were 95% and 94% respectively. At the optimum experimental condition of temperature 25°C, initial TC concentration 50 mg/l, contact time 2.5hr, agitation speed 200 rpm and pH 6.5. The characterization of Cladophora and Spirulina biomass by Fourier transform infrared (FTIR) indicates that the presenc
... Show MoreThis research deals with the motives of the use of Facebook by elderly people and the achieved needs, which leads the researcher to ask an important question: why an old persons use Facebook and are the achieved needs through which they got? The research aims to find out the habits and patterns of using Facebook by old men and stands on the main motives of the elderly in their use of Facebook. It also identifies the most prominent needs that have been made for the elderly as a result of their use of Facebook.
The research is a descriptive one in which the researcher uses survey method to achieve the desired goals. The researcher has chosen a group of old men from Diyala province. The total sample number is about
... Show MoreIn this study, the quality assurance of the linear accelerator available at the Baghdad Center for Radiation Therapy and Nuclear Medicine was verified using Star Track and Perspex. The study was established from August to December 2018. This study showed that there was an acceptable variation in the dose output of the linear accelerator. This variation was ±2% and it was within the permissible range according to the recommendations of the manufacturer of the accelerator (Elkta).
This study includes Estimating scale parameter, location parameter and reliability function for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).
Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More