Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates the algorithm performance for concealing different types of secret media, such as MS office file formats, image files, PDF files, executable files, and compressed files.
The effect of air injection angle on the performance of airlift pump used for water pumping has been studied analytically and experimentally. An airlift pump of dimensions 42mm diameter and 2200 mm length with conventional and modified air injection device was considered. A modification on conventional injection device (normal air-jacket type) was carried out by changing injection angle from 90 (for conventional) to 45 and 22.5 (for modified). Continuity and one-dimensional momentum balance for the flow field with basic principle of two-phase flow and expressions of slip ratio and friction factor as function of flow rates were formulated. The analytical and experimental investigations were carried out f
... Show MoreThis contribution provides an atomistic understanding into the impact of W, Nb, and Mo co-substitution at Hf-site of cubic HfO2 lattice to produce Hf1−xTMxO2 system at x = 25%. The calculations have been performed under the framework of density functional theory supported by Habbured parameter (DFT+U). Structural analysis demonstrates that the recorded lattice constants is in good coherence with the previously published results. For the lattice parameters, contraction by 1.33% comparing with the host system has been reported. Furthermore, the doping effect of TM on the band gap leads to its reduction in the resulting Hf0.75TM0.25O2 configurations. The partial density of states (PDOS) indicate that hybridization through localized electroni
... Show MoreThe research aims to measure the relationship and the impact of knowledge management processes to achieve the performance of insurance service, as well as analysis of the reality of the National Insurance Company to identify the level of overall performance, and to achieve this goal, it has been the selection of knowledge management processes according to the survey prepared a supplement to the study (Qubaisi, 2002), and of the four operations (knowledge generation, and storage of knowledge, and the distribution of knowledge, and application of knowledge), which represented the independent variable, and the performance has been the use of quantitative and qualitative measures, (sales growth, customer satisfaction), which represented the
... Show More— In light of the pandemic that has swept the world, the use of e-learning in educational institutions has become an urgent necessity for continued knowledge communication with students. Educational institutions can benefit from the free tools that Google provide and from these applications, Google classroom which is characterized by ease of use, but the efficiency of using Google classroom is affected by several variables not studied in previous studies Clearly, this study aimed to identify the use of Google classroom as a system for managing e-learning and the factors affecting the performance of students and lecturer. The data of this study were collected from 219 members of the faculty and students at the College of Administra
... Show MoreThe Video Assistant Referee (VAR) is a technology designed to review on- eld decisions through video footage in order to correct clear and critical refereeing errors. It enables the replay of key moments in slow motion to determine the correct naldecision,withcommunicationbetweenthevideoof cialsandtherefereeconductedviaheadset.Thesystem operates under the principle of "minimal interference, maximum bene t," intervening only in essential situations. This study aimedtoassessthecurrent implementationofVARintheIraqStarsFootballLeagueduringthe2023–2024season. To achieve this objective, the researchers employed a descriptive survey method involving a sample of 220 participants, including referees, coaches, players, assessors, academics, a
... Show MoreAbstract:
The current research aims to demonstrate the relationship of correlation and influence between the independent variable strategic control through its dimensions represented by (organizational structure, human resources management, commitment to specialization, defining powers and responsibilities, values and integrity) and the dependent variable the performance of the insurance company, and the degree of arrangement of these dimensions according to their importance, as well as Detection of significant differences in the sample's response to the questionnaire paragraphs in the researched company, and the research problem
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreNowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show MoreIn this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained