Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods in terms of average segmental SNR, number of failing samples, and Czekanowski Distance (CZD). In addition, the proposed method shows the ability to operate with large message sizes (up to half of carrier size) with graceful degradation as opposed to the other methods which fail at large message size. So, the proposed method provides more flexibility in message and carrier sizes while preserving high efficiency.
A polycrystalline CdTefilms have been prepared by thermal evaporation technique on glass substrate at room temperature. The films thickness was about700±50 nm. Some of these films were annealed at 573 K for different duration times (60, 120 and 180 minutes), and other CdTe films followed by a layer of CdCl2 which has been deposited on them, and then the prepared CdTe films with CdCl2 layer have been annealed for the same conditions. The structures of CdTe films without and with CdCl2 layer have been investigated by X-ray diffraction. The as prepared and annealed films without and with CdCl2 layer were polycrystalline structure with preferred orientation at (111) plane. The better structural pr
... Show MoreThis research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen
Wireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi
... Show MoreThe accuracy of the Moment Method for imposing no-slip boundary conditions in the lattice Boltzmann algorithm is investigated numerically using lid-driven cavity flow. Boundary conditions are imposed directly upon the hydrodynamic moments of the lattice Boltzmann equations, rather than the distribution functions, to ensure the constraints are satisfied precisely at grid points. Both single and multiple relaxation time models are applied. The results are in excellent agreement with data obtained from state-of-the-art numerical methods and are shown to converge with second order accuracy in grid spacing.
Drones play a vital role in the fundamental aspects of Industry 4.0 by converting conventional warehouses into intelligent ones, particularly in the realm of barcode scanning. Various potential issues frequently arise during barcode scanning by drones, specifically when the drone camera has difficulty obtaining distinct images due to certain factors, such as distance, capturing the image whilst flying, noise in the environment and different barcode dimensions. In addressing these challenges, this study proposes an approach that combines a proportional–integral–derivative (PID) controller with image processing techniques. The PID controller is responsible for continuously monitoring the camera’s input, detecting the difference
... Show MoreThe nanocomposite on the base of synthesis Copper iodide
nanoparticles and polyvinyl alcohol (PVA/CuI) with different
concentration of CuI were obtained using casting technique.
PVA/CuI polymer composite samples have been prepared and
subjected to characterizations using FTIR spectroscopy, The FTIR
spectral analysis shows remarkable variation of the absorption peak
positions with increasing CuI concentration. The obtained results by
X-ray diffraction indicated the formation of cubic CuI particles. The
effects of CuI concentrations on the optical properties of the PVA
films were studied in the region of wavelength, (190-1100) nm.
From the derivation of Tauc's relation it was found that the direct
allowed t
The mechanical properties and microstructure of hot-rolled steel are critical in determining its performance in industrial applications, particularly when exposed to elevated temperatures. This study examines the effects of varying temperatures and soaking times on these properties through a series of controlled experiments. The primary objective was to optimize the key response parameters, including tensile strength, yield strength, and elongation, by analyzing the influence of temperature and time. A full factorial design approach was used, applying the desirability function theory to explore all possible combinations and identify optimal processing conditions. The experimental results showed that the soaking time played a critica
... Show More
