Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreThis study is conducted in order to, investigate the trophic state of Duhok Lake Dam located within Duhok city, Iraq. Water samples are collected seasonally from three monitored sites during 2011. The parameters used for assessing water quality and trophic status level include: water temperature, pH, EC, TDS, DO, BOD5, nutrients, Secchi disk transparency, and chlorophyll a. The results reveal that DO is above 5 mg.l-1 in all sites, BOD5 value is within permissible level for domestic uses. Water quality considered as a hard type. High sulfate concentration is recorded during the study period. Trophic state shows that water type is classified as mesotrophic during autumn season, while it is regarded as eutrophic in other seasons. TDN/TDP rati
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreFour new binuclear Schiff base metal complexes [(MCl2)2L] {M = Fe 1, Co 2, Cu 3, Sn 4, L = N,N’-1,4-Phenylenebis (methanylylidene) bis (ethane-1,2-diamine)} have been synthesized using direct reaction between proligand (L) and the corresponding metal chloride (FeCl2, CoCl2, CuCl2 and SnCl2). The structures of the complexes have been conclusively determined by a set of spectroscopic techniques (FT-IR, 1H-NMR, and mass spectra). Finally, the biological properties of the complexes have been investigated with a comparative approach against different species of bacteria (E. coli G-, Pseudomonas G-, Bacillus G+,
... Show MoreSoil pH is one of the main factors to consider before undertaking any agricultural operation. Methods for measuring soil pH vary, but all traditional methods require time, effort, and expertise. This study aimed to determine, predict, and map the spatial distribution of soil pH based on data taken from 50 sites using the Kriging geostatistical tool in ArcGIS as a first step. In the second step, the Support Vector Machines (SVM) machine learning algorithm was used to predict the soil pH based on the CIE-L*a*b values taken from the optical fiber sensor. The standard deviation of the soil pH values was 0.42, which indicates a more reliable measurement and the data distribution is normal.
With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreClassifying an overlapping object is one of the main challenges faced by researchers who work in object detection and recognition. Most of the available algorithms that have been developed are only able to classify or recognize objects which are either individually separated from each other or a single object in a scene(s), but not overlapping kitchen utensil objects. In this project, Faster R-CNN and YOLOv5 algorithms were proposed to detect and classify an overlapping object in a kitchen area. The YOLOv5 and Faster R-CNN were applied to overlapping objects where the filter or kernel that are expected to be able to separate the overlapping object in the dedicated layer of applying models. A kitchen utensil benchmark image database and
... Show MorePolycystic syndrome (PCOS) is a considerable infertility disorder in adolescents and adult women in reproductive age. Obesity is a vigorous risk factor related to POCS. This study aims to evaluate the association of obesity and PCOS by investigating several parameters including: anthropological, biochemical (lipid profile, fasting blood sugar, glucose tolerance test, and hormone levels (LH, FSH, LH/FSH ratio, Estradiol2 and Testosterone),and genetic parameters (Fat mass and Obesity associated gene (FTO) polymorphism at rs17817449) in 63 obese and non-obese PCOS women. The biochemical tests were investigated by colorimetric methods while FTO gene polymorp
... Show MorePolycystic syndrome (PCOS) is a considerable infertility disorder in adolescents and adult women in reproductive age. Obesity is a vigorous risk factor related to POCS. This study aims to evaluate the association of obesity and PCOS by investigating several parameters including: anthropological, biochemical (lipid profile, fasting blood sugar, glucose tolerance test, and hormone levels (LH, FSH, LH/FSH ratio, Estradiol2 and Testosterone),and genetic parameters (Fat mass and Obesity associated gene (FTO) polymorphism at rs17817449) in 63 obese and non-obese PCOS women. The biochemical tests were investigated by colorimetric methods while FTO gene polymorphism was detected by PCR–RFLP. Lipid profile, F
... Show More