Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates the algorithm performance for concealing different types of secret media, such as MS office file formats, image files, PDF files, executable files, and compressed files.
The purpose of this study is to examine the dimensions of strategic intent (SI; see Appendix 1) according to the Hamel and Prahalad model as a building for the future, relying on today’s knowledge-based and proactive strategic directions of management as long-term and deep-perspective creative directions, objective vision and rational analysis, integrative in work, survival structure and comprehensiveness in perception.
The quantitative approach was used based on research, detection and proof, as data were collected from leader
During the 1970s, communicative view of language teaching began to be incorporated into syllabus design. The central question for the proponents of this view was: what does the learner want/need to do with the target language? This lead to the emergence of a teaching method (or approach) called communicative language teaching (CLT) during the late 1970s and early 1980s focusing on the functions that must be incorporated into a classroom. According to Brown (2001:43) CLT is a unified but broadly based, theoretically well informed set of tenets about the nature of language and of language learning and teaching. Harmer (2001:84) states that the communicative approach is the name which was given to a set of beliefs which included not only a
... Show MoreThe research aimed mainly to discover the effectiveness of the (PEOE) model in teaching science to develop the skills of generating and evaluating information and the emotional side of the scientific sense of the intermediate first grade students. An experimental approach with a quasi-experimental design called pre-test and post-test control design was used. The research sample consisted of (60) students, who were selected in a random cluster method, (30) students in the experimental group studied the unit "The Nature of Material" using the (PEOE) model, and (30) students in the control group studied according to the prevailing method of teaching. The research materials and tools were represented in: a teacher's guide for teaching the un
... Show MoreThis research is a continued efforts for a project on the fire tube boiler control for Al Rasheed edible oil factory. The aim is to enhance the control system with new integral control one. A functional blocks diagram (FBD) was built and simulated. With Schneider smart relays, FBD differs than ladder logic programming in which the PID option is active. An extensive work was done to understand the operation sequence, emergency shutdown, and faults causing the trips. A control program was designed to control logical sequence of operation. Furthermore temperature is controlled via cascade control with fuel and air controllers. The temperature controller output is send as remote set point to the fuel controller in a serial cascade manner. The f
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThe present study is a hybrid method of studying the effect of plasma on the living tissue by using the image processing technique. This research explains the effect of microwave plasma on the DNA cell using the comet score application, texture analysis image processing and the effect of microwave plasma on the liver using texture analysis image processing. The study was applied on the mice cells. The exposure to the plasma is done by dividing the mice for four groups, each group includes four mice (control group, 20, 50, 90 second exposure to microwave plasma). The exposure to microwave plasma was done with voltage 175v and gas flow on 2 with room temperature; the statistical features are obtained from the comet score images and the textur
... Show MoreThe study introduces the twentieth century background where the image of teacher is shaped by various factors according to the wide emergence of new educational institutions in the aftermath of the Second World War. A group of writers mirrored the influence of the war on educational institutions and accordingly on the image of teacher in their novels whose main action is set in and around the campus of a university. The genre dates back to the nineteen forties. where they show the foibles of human nature and reactions to external pressures. One of the early examples of this genre is Lucky Jim (1954). The image of teacher is swinged in many shapes from the tyrant to the rebellion to the defiant. All is personified in the characters of these
... Show MoreThis research aims to study the performance of comedian in the plays of writer Moliere . The problem of research is to answer the following question: How does comedian Moliere's techniques in a number of his plays and funny acts? The research aims at revealing the means used by the comedian in his performance of a comedic character in the number of Moliere plays.
&
... Show MoreThe developments and transformations taking place in the era and the growth of knowledge economies and communication technology led this development to compel higher education institutions in Iraq to reconsider their objectives to keep pace with development. And one of the most important tools of development was the application of e-learning standards and its long-term impact on the performance of the educational institution. Performance auditing plays an important role in verifying the extent to which these institutions have implemented their activities and programs that auditing performance by adopting e-learning standards helps the institutions’ management by providing appropriate information on the extent to which they achieve thei
... Show MoreThe normalized difference vegetation index (NDVI) is an effective graphical indicator that can be used to analyze remote sensing measurements using a space platform, in order to investigate the trend of the live green vegetation in the observed target. In this research, the change detection of vegetation in Babylon city was done by tracing the NDVI factor for temporal Landsat satellite images. These images were used and utilized in two different terms: in March 19th in 2015 and March 5th in 2020. The Arc-GIS program ver. 10.7 was adopted to analyze the collected data. The final results indicate a spatial variation in the (NDVI), where it increases from (1666.91 𝑘𝑚2) in 2015 to (1697.01 𝑘𝑚2)) in 2020 between the t
... Show More