Preferred Language
Articles
/
6xZFuIcBVTCNdQwCnF7_
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method can be considered a success and can be adopted in the field of steganography

Publication Date
Fri Jan 01 2021
Journal Name
Revista Iberoamericana De PsicologÍa Del Ejercicio Y El Deporte
SPECIAL EXERCISES IN THE HIERARCHICAL OPPOSING TRAINING METHOD AND ITS EFFECT ON DEVELOPING PHYSICAL ABILITIES AND ACCURACY OF SOCCER SCORING FOR ADVANCED PLAYERS
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the path analysis method to diagnoseFactors influencing the intentions of the employees of the University of Dhi Qar To introduce Internet behavior
...Show More Authors

The purpose of this study is to diagnose factors that effect Thi-Qar behavioral intention to use internet. A sample of (127) internet users of university staff was taken in the study and were analyzed by using path analyze . The study concluded that there is a set of affecting correlation. It was founded that exogenous variables (gender, income, perceived fun, perceived usefulness, Image, and ease of use) has significant effect on endogenous (behavioral intention) . The result of analysis indicated that image hopeful gained users comes first, ease of use secondly, perceived fan and perceived usefulness on (dependent variables (daily internet usage and diversity of internet usage. Implication of these result are discussed . the st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 12 2021
Journal Name
Annals Of The Romanian Society For Cell Biology
Effect of the opposite hierarchical training method to developing explosive power, which is characterized by speed and some functional variables for basketball players
...Show More Authors

The current world seeks to supply the most of the fruits of human knowledge and tries hard to search for the most important scientific facts, programs, means and advanced devices in various fields, including the sports field, and among these means is the use of various and advanced training devices and programs for the purpose of achieving the desired goal, which is to reach the desired level, the basketball game is one of the sports that need high technology in training according to scientifically studied principles because it is one of the games that relate to the abundance of its variables, composition and speed of change, all of which require a technical and high training depth and the players ’possession of different physical charact

... Show More
View Publication
Publication Date
Sat Oct 25 2025
Journal Name
Iet Networks
An Effective Technique of Zero‐Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method
...Show More Authors
ABSTRACT<p>The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t</p> ... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Determinants of Investment Allocations in the Agricultural Sector in Iraq : A Comparison Between the Method of least Squares Approach and the errror Correction Model
...Show More Authors

Abstract

                 The research aimed to test the relationship between the size of investment allocations in the agricultural sector in Iraq and their determinants using the Ordinary Least Squares (OLS) method compared to the Error Correction Model (ECM) approach. The time series data for the period from 1990 to 2021 was utilized. The analysis showed that the estimates obtained using the ECM were more accurate and significant than those obtained using the OLS method. Johansen's test indicated the presence of a long-term equilibrium relationship between the size of investment allocations and their determinants. The results of th

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
The Effect of the Rapid Learning Method in Developing Creative Thinking Among Second-Grade Students in the Middle School in the Subject of History
...Show More Authors

The current research aims to examine the effect of the rapid learning method in developing creative thinking among second-grade female students in the subject of history. Thus, the researcher has adopted an experimental design of two groups to suit the nature of the research. The sample of the study consists of (36) randomly selected students from Al-Shafaq Secondary School for Women, which are divided randomly into two groups. The first group represents the experimental; it includes (31) students who studied the subject of history using the quick learning method. The second group, on the other hand, is the control group, which consists of (32) students, who studied the same subject using the traditional way. Before starting with the exp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Establishment of method and the development of the teaching methods in the late abbissid period and it s impact on the contemporary leading methods
...Show More Authors

Every researcher must say that the world in continually progress toward the best and that
the Arab and Islamic civilization had produced much of systems and virtuous educational
practices which raised from Islamic heritage. This nation was not isolated from external
world, but it was made a clear active for promote the banner of other nations which entered
under her influence to promote Islamic banner and Muslims. Consequently also Muslims are
affected and influenced, this resulted a clear impact in the civilization and educational
ideology especially in the contemporary teaching methods.

View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Physics Of Atomic Nuclei
Electroexcitation Form Factors for Positive- and Negative-Parity States in Some Si Isotopes Using Truncated Large-Scale Shell Model With Skyrme–Hartree–Fock Method
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
The construction of Complete (kn,n)-arcs in The Projective Plane PG(2,5) by Geometric Method, with the Related Blocking Sets and Projective Codes
...Show More Authors

A (k,n)-arc is a set of k points of PG(2,q) for some n, but not n + 1 of them, are collinear. A (k,n)-arc is complete if it is not contained in a (k + 1,n)-arc. In this paper we construct complete (kn,n)-arcs in PG(2,5), n = 2,3,4,5, by geometric method, with the related blocking sets and projective codes.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of performance of some industrial companies In the default reference comparison method Field study in the public companies of cement (Iraqi - North - South
...Show More Authors

The increasing Global Competitive and the continuous improvement in information technology has led the way to the development of the modern systems and using modern techniques. One of these techniques is benchmarking style and Total Quality Management all of them are used to improve the production process and target rid from the losts on the other side.

The Benchmarking style has become a very important for all the industrial systems and the serving systems as well. And an instrument to improve their performance specially those which are suffering from the highness of the costs or waste in time on the other side.

This study aims to depend on virtual Benchmarking style in the eval

... Show More
View Publication Preview PDF
Crossref