Preferred Language
Articles
/
ijp-648
Studying Audio Capacity as Carrier of Secret Images in Steganographic System
...Show More Authors

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect presence of hidden image. Measures calculations of SNR, SNR segmental, SNR spectral, MSE and correlation show that, audio music cover file (2channales) is the safest uses as arrier with replace the 9 number of LSB without noticeable noise. Bits of secret message can be hiding capacity reach up to 28 % of the total music cover audio size and the three type's measures of SNR are 32, 28 and 31 dB. For speech cover audio the replacing LSB is safely uses at LSB bits number 6, where the hiding capacity is reach up to 37 % of size speech cover audio at 37, 36 and 39 dB for three type's measures of SNR. Correlation of cover samples was did not effected as a result of hiding secret image, where its value is up to 0.99 for all hiding operations.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
THE SIZES OF CITIES IN URBAN SYSTEM AND REGIONAL DEVELOPMENT -AN APPLIED RESEARCH OF KERBLA GOVERNORATE -
...Show More Authors

There is a relationship between the sizes of urban centers and regional
development, concerning the role that these centers are playing in
developmental process.
The research assume that the urban system in the governorate, has
been affected by the external environment due to the religious dominance of
Kerbla city.
The research is composed of three sections, the first is a theoretical
background, which focus upon the general directions of the models and
theories that have a relationship with the subject. The second is a practical
part aims at determination the characteristics of the sizes of the cities in the
governorate. Depending upon of previous part, i.e., the practical part section three deals with

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
The effectiveness of the Iraqi banking system in dealing with the effects of fiscal austerity policy
...Show More Authors

Abstract:

    Under the state scenario, fiscal policy will not be able to use the oil surpluses optimally and economically and society, as long as these surpluses are not directed by public expenditure towards new productive investments and by following the path of fiscal policy after one year 2003 and until 2013 we note that it is based on the method of spending (excessive) consumption, and did not take any action towards the budget deficit planned at the beginning of the fiscal year, and the actual surplus at the end of the fiscal year, which represents the highest expenditure in the budget, Salaries and wages of workers in various government agencies with the expansion of spending on the security side.&n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Sun Apr 29 2018
Journal Name
Iraqi Journal Of Science
Semantic Based Video Retrieval System: Survey
...Show More Authors

In this review paper a number of studies and researches are surveyed, in order to assist the upcoming researchers, to know about the techniques available in the field of semantic based video retrieval. The video retrieval system is used for finding the users’ desired video among a huge number of available videos on the Internet or database. This paper gives a general discussion on the overall process of the semantic video retrieval phases. In addition to its present a generic review of techniques that has been proposed to solve the semantic gap as the major scientific problem in semantic based video retrieval. The semantic gap is formed because of the difference between the low level features that are extracted from video content and u

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Journal Of Pharmacy Research
Pulsatile drug delivery system-review article
...Show More Authors

Pulsatile drug delivery systems (PDDS) are developed to deliver drug according to circadian behavior of diseases. They deliver the drug at the right time, action and in the right amount, which provides more benefit than conventional dosages and increased patient compliance. The drug is released rapidly and completely as a pulse after a lag time. These systems are beneficial for drugs with chrono-pharmacological behavior, where nighttime dosing is required and for the drugs having a high first-pass effect and having specific site of absorption in the gastrointestinal tract. This article covers methods and marketed technologies that have been developed to achieve pulsatile delivery. Diseases wherein PDDS are promising include asthma, peptic u

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 24 2018
Journal Name
Journal Of Pharmacy Research
Transdermal drug delivery system: A review
...Show More Authors

Transdermal drug delivery has made an important contribution to medical practice but has yet to fully achieve its potential as an alternative to oral delivery and hypodermic injections. Transdermal therapeutic systems have been designed to provide controlled continuous delivery of drugs through the skin to the systemic circulation. A transdermal patch is an adhesive patch that has a coating of drug; the patch is placed on the skin to deliver particular amount of drug into the systemic circulation over a period of time. The transdermal drug delivery systems (TDDS) review articles provide information regarding the transdermal drug delivery systems and its evaluation process as a ready reference for the research scientist who is involved

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences
Dewatering System Control by MATLAB Software
...Show More Authors

The aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 10 2010
Journal Name
Iraqi Journal Of Laser
Disc Laser System Construction and Characterization
...Show More Authors

 In this work a Nd:YVO4 thin disc laser setup is designed and fabricated. The disk laser system
is designed to be compact. The laser crystal was pumped by a 808 nm diode laser. The effect of input
current and pulse frequency on the output energy at pulse operation mode, and the effect of the input
current on the output power at CW mode operation are tested. At the pulsed mode, the output energy
increased linearly with the input current and decreased with pulse frequency. The threshold current
increased with increasing pulse frequency increasing. The maximum output energy from the thin disc
laser was 0.98 μJ at 1.3 kHz frequency, with 0.49A. A minimum threshold current for CW mode of
operation. The maximum outpu

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 01 2022
Journal Name
Computers And Electrical Engineering
Automatic illness prediction system through speech
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref