Preferred Language
Articles
/
ijp-648
Studying Audio Capacity as Carrier of Secret Images in Steganographic System
...Show More Authors

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect presence of hidden image. Measures calculations of SNR, SNR segmental, SNR spectral, MSE and correlation show that, audio music cover file (2channales) is the safest uses as arrier with replace the 9 number of LSB without noticeable noise. Bits of secret message can be hiding capacity reach up to 28 % of the total music cover audio size and the three type's measures of SNR are 32, 28 and 31 dB. For speech cover audio the replacing LSB is safely uses at LSB bits number 6, where the hiding capacity is reach up to 37 % of size speech cover audio at 37, 36 and 39 dB for three type's measures of SNR. Correlation of cover samples was did not effected as a result of hiding secret image, where its value is up to 0.99 for all hiding operations.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
College Of Islamic Sciences
The hadiths of Abdullah bin Amr bin Al-Aas، may God be pleased with them، that there is no room for diligence in them ((collecting and studying))
...Show More Authors

Research Summary


The research revolves around the collection of pending hadiths on Abdullah bin Amr bin Al-Aas, may God be pleased with them, and it is required in these hadiths that they be among those in which there is no room for diligence, such as telling about unseen matters, signs of the Hour, or a statement of virtue and reward for obedience, or punishment for disobedience.

The research consists of an introduction, two topics, and a conclusion of the first topic in the translation of Abdullah bin Amr bin Al-Aas, and the second topic, the pending hadiths of Abdullah bin Amr bin Al-Aas, may God be pleased with them, in which there is no room for diligence in collecting and studying

At the end of this rese

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 30 2021
Journal Name
Al-kindy College Medical Journal
Introduction of an Appointment System in Primary Health Care Setting in Baghdad: Views of Patients and Health Care Providers
...Show More Authors

Background: The appointment system is a common practice in primary health care clinics in developed countries. The patients and health care providers in the primary health care setting perceived the appointment system as an indicator of good quality service.

Objective: The aim of this study was to survey patients’ and health care providers’ attitudes towards the introduction of an appointment system and their satisfaction with the existing ‘walk-in’ system in the primary health care setting.

Subjects and Methods: A questionnaire survey was conducted included a convenient sample of 234 patients as well as 76 health care providers from two primary health care center

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
The Effect of the Portal System in Achievement Motivation and Cognitive of Fifth Grad Students in Geographic Literary Material
...Show More Authors

The study aimed to identify the impact of the use of systemic approach in the collection of geographical material and cognitive motivation when fifth grade students of literary, experimental design researcher adopted a partial seizures, and telemetric to two unequal one experimental and the other officer.
The sample consisted of fifth grade literary students from secondary (inherent) for Boys in Baghdad (the Republic of Iraq. (By Mjootain, and the number of students of each group (30 students). And has rewarded the two groups, in the variables (chronological age, average scores half-year, degree IQ),
Promising researcher himself requirements of research to determine the scientific material and teaching plans and the formulation of

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 23 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and in-vitro Evaluation of Secnidazole as Periodontal In-situ Gel for Treatment of Periodontal Disease
...Show More Authors

This study aims to develop a thermosensitive mucoadhesive periodontal in situ gel of secnidazole for local release of drug for treatment of periodontitis, in order to increase the drug residence time and to increase patient compliance while lowering the side effects of the drug.

Cold method was used to prepare 30 formulas of secnidazole periodontal in situ gel, using different concentrations of thermosensitive polymers (poloxamer407 alone or in combination with poloxamer 188) and methyl cellulose (MC ) or hydroxypropyl methylcellulose (HPMC K4M )in different concentrations used as mucoadhesive polymer and the resultant formulations were subjected to several tests such as   gelation temperature GT, appearance and pH value. The fo

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Internal Contrl in Electronic Accounting Information System: Applied Study in Spacimen from Kurdistan Regin Iraq
...Show More Authors

Internal control is system,defined and implemented under its responsibility , which aims to ensure that; laws and regulations are complied with; the instructions and directional guidelines fixed by Executive Management or the Management Borad are applied; the company internal processes are functioning correctlly , particularly those implicating the security of its assets; Financial Information is reliable; and generally contributes to the control over its activities , to the efficiency of its operation and to the efficient utilisation of its Resources. By helping to anticipate and control the risks involved in not meeting the objectives the company has set for itself, the internal control system plays akey role in conducting & monito

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Pakistan Association Of Dermatologists
The role of epigenetics in immunosuppression in patients with infectious diseases as a fascinating applied observation
...Show More Authors

Scopus
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
AXIAL FAN BEARING SYSTEM VIBRATION ANALYSIS
...Show More Authors

Rotating fan shaft system was investigated experimentally and theoretically to study its dynamic performance. The type of oil used for the bearing was taken in consideration during the experimental program .Three types of oil were used, SAE 40, SAE 50 and degraded oil. During the experiments, the fan blades stagger angle was changed through angles (20˚, 30˚, 40˚, and 50˚). The shaft rotational speed also changed in the range of (0-3000 rpm). All these parameters have investigated for two cases (balanced and unbalanced fan). The performance parameters of the fan were found experimentally by measuring the fan, volume flow rate, Reynolds and Strouhal numbers, efficiency and pressure head. Analytical part was also represented to prepare

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Journal Of Pharmacy Research
Pulsatile drug delivery system-review article
...Show More Authors

Pulsatile drug delivery systems (PDDS) are developed to deliver drug according to circadian behavior of diseases. They deliver the drug at the right time, action and in the right amount, which provides more benefit than conventional dosages and increased patient compliance. The drug is released rapidly and completely as a pulse after a lag time. These systems are beneficial for drugs with chrono-pharmacological behavior, where nighttime dosing is required and for the drugs having a high first-pass effect and having specific site of absorption in the gastrointestinal tract. This article covers methods and marketed technologies that have been developed to achieve pulsatile delivery. Diseases wherein PDDS are promising include asthma, peptic u

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Design and Construction Optical Pumping System
...Show More Authors

In this work the design and construction of optical pumping system was presented. The parameters of the pumping source to obtain discharge current density sufficient to shift the flash lamp spectrum towards uv portion of spectrum were measured.The current density was supplied to the flash lamp must be greater than 4000Amp./cm2 to obtain the spectral range wavelength lies between 0.2 and 0.35?m. The current density was obtained by a capacitor 50?F, at 7KV discharge voltage. The applied electrical energy to the flash lamp was more than 1200 J, and the current density was around 5000 Amp./cm2.The electrical parameters of the flash lamp were calculated. The impedance parameters(K0) from the voltage and the peak current pulse was measured in ran

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref