Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods in terms of average segmental SNR, number of failing samples, and Czekanowski Distance (CZD). In addition, the proposed method shows the ability to operate with large message sizes (up to half of carrier size) with graceful degradation as opposed to the other methods which fail at large message size. So, the proposed method provides more flexibility in message and carrier sizes while preserving high efficiency.
Mobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,
... Show MoreThis study investigates the characterization and growth dynamics of a Magnetically Stabilized Gliding Arc Discharge (MSGAD) system, generating non-thermal plasma with argon gas under atmospheric pressure and flow rates of 1-5 L/min. The electrical properties and growth patterns concerning gas flow rates and applied voltages were examined utilizing a magnetic field for stability. Using a digital oscilloscope, a correlation between voltage reduction and increased current was uncovered. An algorithm analyzes digital images to compute arc length, area, and volume. Results reveal how gas flow rate and applied voltage directly impact arc growth. Furthermore, the magnetic field's role in guiding and stabilizing the plasma discharge was explored. T
... Show MoreIn this work, HgBa2CaCu2-xSbxO8+δ compounds with (x = 0.2, 0.4, 0.6 and 0.8) have been prepared by the solid-state reaction method. Structural, morphological, and electrical properties were investigated using X-ray diffraction (XRD) and scanning electron microscope (SEM) techniques. Using the 4-probe technique to study the effect of antimony-substitution for Copper on the electrical properties of HgBa2CaCu2-xSbxO8+δ (Hg-1212) phase was investigated by measuring the resistivity as a function of temperature. Results indicate that the addition of antimony (Sb) increases the volume fraction of the phase and changes the superconducting transition temperature Tc of the superconductor to a normal state. The dielectric loss factor and ac
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreAn experimental study was performed to estimate the forced convection heat transfer performance and the pressure drop of a single layer graphene (GNPs) based DI-water nanofluid in a circular tube under a laminar flow and a uniform heat flux boundary conditions. The viscosity and thermal conductivity of nanofluid at weight concentrations of (0.1 to 1 wt%) were measured. The effects of the velocity of flow, heat flux and nanoparticle weight concentrations on the enhancement of the heat transfer are examined. The Nusselt number of the GNPs nanofluid was enhanced as the heat flux and the velocity of flow rate increased, and the maximum Nusselt number ratio (Nu nanofluid/ Nu base fluid) and thermal performance factor
... Show MoreThis study investigated the healing effects of topical application of zerumbone, a well‐known anti‐inflammatory compounds loaded on nanostructured lipid carrier gel (Carbopol 940) (ZER‐NLCG) on excisional wounds in streptozotocin‐induced diabetic rats. Diabetic rats with inflicted superficial skin wound were topically treated with ZER‐NLCG, empty NLCG, and silver sulfadiazine cream (SSDC) once daily for 21 days. Wound tissue samples were analyzed for proinflammatory cytokines, namely, interleukin‐6 (IL‐6), interleukin‐1
Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil
... Show MoreDrawing upon the recent theoretical framework of Burkean concept of identification (ID), the current study aims at probing the interaction of content and form in two letters penned by Iran’s Supreme Leader and addressed to the Youth on Jan. and Nov. 2015. To this end, the study seeks (i) to determine a role ID takes in the conveyance of intended assumptions to the targeted readers; and (ii) to observe if the writer’s objectives, i.e. to identify himself with the readers and to realize his politically-religiously-infused creeds, result in success or failure; moreover, (iii) it seeks to determine how he achieved his end to attenuate the impacts of blazing inferno of Islamophobia and anti-Islam sentiments in his addressees. The who
... Show MoreThe tourism services provided in the hotel organizations are a set of material and moral elements that represent tourist attractions that are offered to the guests in order to satisfy their needs and desires are accommodation, food, drink and other facilities to reach the satisfaction and satisfaction of guests.Where these tourist services need a mechanism to ensure their quality by working to identify and calculate the costs of these services properly and accurately with the attempt to referendum and reduce the waste and loss to reduce these costs while providing the finest types of tourism services by calculating the cost of production and the administration seeks to reduce Non-essential activities through hotel activities that add val
... Show More