Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
In this paper, the time-history responses of a square plan two-story reinforced concrete prototype building, considering the elastic and inelastic behavior of the materials, were studied numerically. ABAQUS software was used in three-dimensional (3D) nonlinear dynamic analysis to predict the inelastic response of the buildings. Concrete Damage Plasticity Model (CDPM) has been used to model the inelastic behavior of the reinforced concrete building under seismic excitation. The input data included geometric information, material properties, and the ground motion. The building structure was designed only for gravity load according to ACI 318 with
... Show MoreThis paper has investigated experimentally the dynamic buckling behavior of AISI 303 stainless steel Aluminized and as received long columns. These columns, hot-dip aluminized and as received, are tested under dynamic buckling, 22 specimens, without aluminizing (type 1), and 50 specimens, with hot-dip aluminizing at different aluminizing conditions of dipping temperature and dipping time (type 2), are tested under dynamic compression loading and under dynamic combined loading (compression and bending) by using a rotating buckling test machine. The experimental results are compared with Perry Robertson interaction formula that used for long columns. Greenhill formula is used to get a mathematical model that descripts the buckling behavior
... Show MoreIn this work, the precursor [2-(1,5-dimethyl-3-oxo-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylimino)acetic acid] was synthesised from 4-aminoantipyrine and glyoxylic acid, this precursor has been used in the synthesis of new multidentate ligand [2-((E)-3-(2-hydroxyphenylimino)-1,5-dimethyl-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylimino)acetic acid][H2L] type (N2O2). The ligand was refluxed in ethanol with metal ions [VO(II), Mn(II), Co(II) and Ni(II)] salts to give complexes of general molecular formula:[M(H2L)2(X)(Y)].B, where: M=VO(II), X=0, Y=OSO3-2, B=2H2O; M=Mn(II),Co(II) ,X=Cl, Y=Cl, B=0; M=Ni(II), X=H2O, Y=Cl, B=Cl. These complexes were characterised by atomic absorpition(A.A), F.T-I.R., (U.V-Vis)spectroscopies (1H,13C NMR for ligand only), alon
... Show MoreThis study research to Showing The impact of the integration process on the quality of Insurance service and analyze the impact financially to determine whether there is any impact on the quality of the insurance service, in addition to identifying the obstacles that impede the merger between the insurance companies, insurance and the appropriate proposals for its' application and benefit from the benefits achieved.
The importance of The study lies in the fact that it is an important and vital spotlight that is becoming increasingly important in the world to confront the various difficulties and crises that have occurred recently in light of the liberalization of international trade, globalization a
... Show MoreNowadays, university education stands in front of both students who feel they are weak and teachers who are addicted to using traditional and dependent teaching. This has led to have negative repercussions on the learner from different aspects, including the mental aspect and the academic achievement process. Therefore, the present research is concerned with finding a new teaching method that adopts the motivation by the fear of failure technique. Thus, the study aims to examine the effect of adopting this method on students’ academic achievement. To achieve this aim, an experimental method was used, and an achievement test was built for the curriculum material of level two students. The pretest test was applied on 17 male and female s
... Show MoreThe current research examines the employment of indicators of stereotypes and the dimensions of organizational clarification to achieve planned organizational behaviour on a sample of employees in a number of departments of the Faculties of Engineering, University of Kufa, for a sample of (122) teaching staff. This research proposes the use of positive indicators of stereotypes for both the organization and employees and their awareness of what they want to obtain and what should be done for both parties and the removal of organizational clarity represented by the functional dimension that explores to what degree the employee's understanding of the internal strategy of the organization and the strategic dimension that searches fo
... Show MoreThe principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreThe study aims to investigate the effect of the Six Thinking Hats Strategy on the achievement of essay writing skills among third-year students in Arabic Language and Literature who are Persian speakers enrolled in the course of Essay Writing (III) at Shiraz University for the academic year 2019-2020. The sample of the study consisted of (15) male and female students who were taught according to the pre-posttest, using the quasi-experimental approach. After applying the statistical analysis on the scores of the post-test, the results showed that there are statistically significant differences in the average of students' achievement in the skills of essay writing in terms of using the Six Thinking Hats Strategy. The results also proved th
... Show More