Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods in terms of average segmental SNR, number of failing samples, and Czekanowski Distance (CZD). In addition, the proposed method shows the ability to operate with large message sizes (up to half of carrier size) with graceful degradation as opposed to the other methods which fail at large message size. So, the proposed method provides more flexibility in message and carrier sizes while preserving high efficiency.
This study investigates the characterization and growth dynamics of a Magnetically Stabilized Gliding Arc Discharge (MSGAD) system, generating non-thermal plasma with argon gas under atmospheric pressure and flow rates of 1-5 L/min. The electrical properties and growth patterns concerning gas flow rates and applied voltages were examined utilizing a magnetic field for stability. Using a digital oscilloscope, a correlation between voltage reduction and increased current was uncovered. An algorithm analyzes digital images to compute arc length, area, and volume. Results reveal how gas flow rate and applied voltage directly impact arc growth. Furthermore, the magnetic field's role in guiding and stabilizing the plasma discharge was explored. T
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreMany purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa
... Show MoreAn experimental study was performed to estimate the forced convection heat transfer performance and the pressure drop of a single layer graphene (GNPs) based DI-water nanofluid in a circular tube under a laminar flow and a uniform heat flux boundary conditions. The viscosity and thermal conductivity of nanofluid at weight concentrations of (0.1 to 1 wt%) were measured. The effects of the velocity of flow, heat flux and nanoparticle weight concentrations on the enhancement of the heat transfer are examined. The Nusselt number of the GNPs nanofluid was enhanced as the heat flux and the velocity of flow rate increased, and the maximum Nusselt number ratio (Nu nanofluid/ Nu base fluid) and thermal performance factor
... Show MoreThis study investigated the healing effects of topical application of zerumbone, a well‐known anti‐inflammatory compounds loaded on nanostructured lipid carrier gel (Carbopol 940) (ZER‐NLCG) on excisional wounds in streptozotocin‐induced diabetic rats. Diabetic rats with inflicted superficial skin wound were topically treated with ZER‐NLCG, empty NLCG, and silver sulfadiazine cream (SSDC) once daily for 21 days. Wound tissue samples were analyzed for proinflammatory cytokines, namely, interleukin‐6 (IL‐6), interleukin‐1
The tourism services provided in the hotel organizations are a set of material and moral elements that represent tourist attractions that are offered to the guests in order to satisfy their needs and desires are accommodation, food, drink and other facilities to reach the satisfaction and satisfaction of guests.Where these tourist services need a mechanism to ensure their quality by working to identify and calculate the costs of these services properly and accurately with the attempt to referendum and reduce the waste and loss to reduce these costs while providing the finest types of tourism services by calculating the cost of production and the administration seeks to reduce Non-essential activities through hotel activities that add val
... Show MoreObjectives: The study objectives were to evaluate customer satisfaction with community pharmacy services and measure the relationships between customer satisfaction and pharmacy/pharmacist characteristics and customer quality of life. Methods: This was a cross-sectional survey of a convenience sample of customers at 20 community pharmacies in 10 different geographical areas in Baghdad city between May and September 2018. We used the satisfaction items which were developed by Paterson and colleagues in 2013. The survey also assessed customer quality of life (QoL) with 12 QoL items. Results: The study recruited 400 pharmacy customers. Overall, customers reported good satisfaction with community pharmacy services. The most
... Show MoreAfter Hamdallah and his success on the realization of this manuscript (a letter in detail what was said in the parents of the Prophet Ibn Kamal Pasha (d. 940 e) study and investigation I will review some of the results reached in the realization of this manuscript:
1. The hadiths mentioned in this manuscript are mostly placed or weak.
2 - We are not entitled to speak about the silence of the law for saying Almighty ﭽ ﮮ ﮯ ﮰ ﮱ ﯓ ﯔ ﯕ ﯖ ﯗ ﯘ ﯙ ﭼ Table: 101.
3 in which harm to our Holy Prophet وله تع ﮂ ﮃ ﮄ ﮅ ﮆ ﮈ ﮉ ﮊ ﮋ ﮌ ﮍ ﮎ ﭼ parties: 57.
4 Because the parents of the Prophet of the people of the period ordered them to God for the Almighty ﭽ ﯨ ﯩ ﯪ ﯫ ﯬ