WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steganographic method hides embedded data at various locations in cover irregularly or randomly, whereas the locations of cover for information hiding are not constant, this property will increase the level of security for proposed method. In the proposed method, the sender needs sending a file that has small size via any communication channel and that considered as a key while sending a cover is not necessary to recipient if both agree about downloading it from the internet before sending a file. The contents of this file are invaluable for an attacker. The programming language that used in programming this proposed method is C++ language. Steganographically, The proposed steganographic method is strong and robust. It is possible classifying this proposed method as a public key steganography system and substitution system at the same time.
The aim of the present study is to examine the effectiveness of a proposed unite in voluntary work in enhancing critical thinking skills and the attitudes towards responsible citizenship among eighth grade female students in the Sultanate of Oman. In order to collect the study data, the researchers employed a quasi-experimental research design with twenty female students from Al-Sideeqah bint Al-Sideeq for basic education school. The research data were collected via a critical thinking test that consisted of twenty-five items and a scale of twenty items under three different dimensions, which aimed to measure students' attitudes towards responsible citizenship. The researchers implemented these two instruments as pre- and post the experi
... Show MoreThis study aimed to identidy the role of a professional social worker practice specialist in the field of social care for Corona patients, in light of some demographic variables such as (gender, marital status, economic status,), through a field study at the Iraqi Ministry of Social Affairs. A random sample of (50) social workers in the Iraqi Ministry of Social Affairs in various places affiliated with the ministry was chosen. a questionnaire developed by the researcher about the role of the social worker in the field of social care for Corona patients was administered to the study sample to collect the needed data. The results showed that there is a positive statistically significant correlation relationship at the level (0.01) between
... Show MoreDigital commercial advertising depends on artistic formations to achieve attraction and arousal of attention, which is one of the most important communication factors that the designer seeks to achieve and is considered a key key to recognizing the beauty of the topic and its functional value. Reframe formal vocabulary.
The research included the introduction and includes the research problem and the need for it, which focused on the following question: What is the aesthetic role of artistic formation in the design of commercial advertising?
The aim of the research was: To reveal the aesthetic role of artistic formation in commercial advertising.
It also included the importance of research and research boundaries, as well as def
The research addresses the role of the digital economy in the growth of the Iraqi economy during the period from 2010 to 2022. The research is based on the hypothesis that the digital economy has become one of the primary growth drivers worldwide and has a close relationship with economic development. Therefore, the digital transformation in Iraq can accelerate bridging developmental gaps with other countries.
It has become evident that the Iraqi economy suffers from structural imbalances for various reasons, hindering economic growth. These reasons include political and economic factors, as well as the absence of a well-thought-out policy to promote the agricultural sector, which is considered one of the fundamental sectors capa
... Show MorePublications are generally considered an effective visual artistic means that addresses the recipient (the audience), with the functional, aesthetic and expressive dimensions they carry that contribute to spreading a diverse cultural awareness, especially those publications that are concerned with their media, promotional and organizational performance, as well as specific cultural events at specific times, in pursuit Access to renewable and elaborate designs to achieve the functional and aesthetic purpose, as the completed design and construction process is subject to many variations, whether this diversity is intellectual or technical, internal or external, and all of them may overlap to obtain a comprehensive system of artistic format
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreWhen sites of new communication occurs which represents the merit of the development of communication technology which is characterized by the services of ( facebook-twiter-corapora-youtube-mass space-friendster-flicker-willnecked in addition to the direct services for viber-whatsup-telgram-and chat on) play important role in changing the infrastructure of Arabic societies which are consideredas closed and not changeable societies during near period and the significance of this study comes from the importounce of this subject which is considered as anew trend of the age on the field of media and public response and acceptance inspite of what is known about Arabic society-it doesn’t accept change-this occurance is associated with terms
... Show MoreThe design of reinforced concrete spread foundations mainly depends on soil bearing capacity, loading value, and column size. So for each design case, tiresome calculations and time consumption are needed. In this paper, generalized design charts are presented and plotted according to derivations based on the ACI 318 M-2019 Code. These charts could be used directly by the structural designers to estimate the column size, foundation thickness, and dimensions as well as the foundation reinforcement under a certain given concentric load assuming a uniformly distributed contact pressure underneath the foundation. Of noteworthy, these charts are oriented to deal with square isolated footings with a square concentric column, covering reasonable r
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show MoreClassification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE), Border
... Show More