Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect presence of hidden image. Measures calculations of SNR, SNR segmental, SNR spectral, MSE and correlation show that, audio music cover file (2channales) is the safest uses as arrier with replace the 9 number of LSB without noticeable noise. Bits of secret message can be hiding capacity reach up to 28 % of the total music cover audio size and the three type's measures of SNR are 32, 28 and 31 dB. For speech cover audio the replacing LSB is safely uses at LSB bits number 6, where the hiding capacity is reach up to 37 % of size speech cover audio at 37, 36 and 39 dB for three type's measures of SNR. Correlation of cover samples was did not effected as a result of hiding secret image, where its value is up to 0.99 for all hiding operations.
The current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show MoreIn this study, dead and live anaerobic biomass was used in biosorption of Pb(II), Cr(III) and Cd(II) ions from a synthetic wastewater. The biosorption was investigated by batch adsorption experiments. It was found that, the biosorption capacities were significantly affected by biosorbent dosage. The process follows Langmuir isotherm (regression coefficient 0.995, 0.99 and 0.987 for Pb(II), Cr(III) and Cd(II) ions, respectively, onto dead anaerobic biomass) model with uniform distribution over the biomass surface. The experimental uptake capacity was 51.56, 29.2 and 28 mg/g for Pb(II), Cr(III) and Cd(II), respectively, onto dead anaerobic biomass, compared with 35, 13.6 and 11.8 mg/g for Pb(II), Cr(III) and Cd(II), respectively, onto live
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreWater quality assessment offers a scientific basis for water resource development and management. This research aims to assessment of Al-Rustamiya sewage treatment plant depending on annually changes and produces maps that declare changes on parameter during a period (2015-2018). Based on prior Government Department Baghdad Environment data which annually feature changes for samples from Northern Rustamiya have been estimated as a working model. Drawn a map of the Diyala River shows annual changes in the characteristics of the Diyala River, based on northern and southern Rustamiya effluent samples, and Diyala River samples. The characteristics that research focused on were biochemical
An approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly
The present paper investigates the role of fear and predator dependent refuge in the prey-predator system. The system describes the interaction between prey and a stage structure of predator that incorporates Holling II functional response. The predator splits into two compartments immature (juvenile) and mature (adult). The mature predators can hunt and reproduce but this capability is not found in the immature predators, the immature depend on their parents. The growth rate of prey decreases due to the existence of mature predators. The existence, uniqueness, and boundedness of the solution of the system are investigated. Three equilibrium points of the system are determined. The local stability of the system is studied. The global stabil
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
Solar photovoltaic (PV) has many environmental benefits and it is considered to be a practical alternative to traditional energy generation. The electrical conversion efficiency of such systems is inherently limited due to the relatively high thermal resistance of the PV components. An approach for intensifying electrical and thermal production of air-type photovoltaic thermal (PVT) systems via applying a combination of fins and surface zigzags was proposed in this paper. This research study aims to apply three performance enhancers: case B, including internal fins; case C, back surface zigzags; and case D, combinations of fins and surface zigzags; whereas the baseline smooth duct rep
Rate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal. The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in
... Show More