Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates the algorithm performance for concealing different types of secret media, such as MS office file formats, image files, PDF files, executable files, and compressed files.
The optimum design is characterized by structural concrete components that can sustain loads well beyond the yielding stage. This is often accomplished by a fulfilled ductility index, which is greatly influenced by the arrangement of the shear reinforcement. The current study investigates the impact of the shear reinforcement arrangement on the structural response of the deep beams using a variety of parameters, including the type of shear reinforcement, the number of lacing bars, and the lacing arrangement pattern. It was found that lacing reinforcement, as opposed to vertical stirrups, enhanced the overall structural response of deep beams, as evidenced by test results showing increases in ultimate loads, yielding, and cracking of
... Show MoreAbstract
The aim of the study is to study the relationship between strategic orientation and organizational performance. The strategic direction is the main purpose for which the organization is found. Therefore, it is the main engine for all the activities and tasks that the institution can carry out to achieve its objectives within the environment in which it operates. ,. The research problem was formed by several questions to determine the level of the strategic direction and the nature of its relationship with organizational performance in the Iraqi Ministry of Defense / Inspector General's Office as the field of application to answer. The sample was selected by a sample of 60 individuals, department managers, And the que
Praise be to God, Lord of the Worlds, and prayers and peace be upon the most honorable of creation, Muhammad, whom God sent as a mercy to the worlds, and his pure God and his faithful companions. The Islamic heritage was replete with texts issued from among the pure infallibility, which constituted a prominent teacher that takes the student to stop there in search of its goals, purposes and beauty. The choice was made from those texts that were issued by the imams of Muslims in the Abbasid era, namely Imam Muhammad al-Jawad, his son Imam Ali al-Hadi and his grandson Imam Hassan Zaki al-Askari. (Peace be upon them), and scholars have called them (sons of satisfaction), and researchers have shed light on these texts from rhetorical, artistic
... Show MoreIn this work, satellite images for Razaza Lake and the surrounding area
district in Karbala province are classified for years 1990,1999 and
2014 using two software programming (MATLAB 7.12 and ERDAS
imagine 2014). Proposed unsupervised and supervised method of
classification using MATLAB software have been used; these are
mean value and Singular Value Decomposition respectively. While
unsupervised (K-Means) and supervised (Maximum likelihood
Classifier) method are utilized using ERDAS imagine, in order to get
most accurate results and then compare these results of each method
and calculate the changes that taken place in years 1999 and 2014;
comparing with 1990. The results from classification indicated that
Left bundle branch block (LBBB) is a common finding in electrocardiography, there are many causes of LBBB.
The aim of this study is to discuss the true prevalence of coronary artery disease (CAD) in patients with LBBB and associated risk factors in the form of hypertension and diabetes mellitus.
Patients with LBBB were admitted to the Iraqi heart center for cardiac disea
Abstract:
Purpose\The researcher paper aims to determine the impact of information technology on the job performance, for Iraq private ban as through the use of technology dimensions of job performance.
The aim of this research: this study aims to discuss the importance of information technology and its role in achieving job performance and its impact on the Iraq banking sector design/ methodology/ approach used entrance design/methodology/approach- pilot, the questionnaire was used to collect data in order to develop a model to measure reliably and correctly to the variables of information technology and job performance, and hypotheses were tested through the use of some statisti
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show MoreAbstract
This study was to demonstrate the role-use planning scientific methods is disabled and little used in the planning and follow-up construction of vital projects in the province of Baghdad, including network planning methods, in order to find the optimal time to finish the project in light of the resources available and the budget set for it, in the current research has been used the most prominent network planning methods and two stylistic (CPM / PERT), was the application of the critical path method on standard-design school project (traditional) to draw Action Network according to confirmed times for the activities of the project and account his Crashing time , It was Pert technique applied to the project hemato
... Show Moreيهدف البحث الى أعداد بعض تمرينات الاساسية لسلاح الشيش بأستخدام المرايا في تطوير قدرة مستوى تعلم الطالبات في المبارزة ومعرفة الفروق بين المجموعتين التجريبي والضابطة بتأثير استخدام المرايا في مستوى اداء بعض مهارات سلاح الشيش لطالبات المرحلة الثالثة , وقد أستخدمت الباحثتان المنهج التجريبي على عينة من طالبات المرحلة الثالثة , وقد بلغ عددهم (45) طالبة , وقد خرجت الباحثتين بعدة أستنتاجات وهي:- - أن المنهاج التعليمي
... Show More