،يريغت وأ ةلكشم وأ ةثداح ةجيتن ،ةعمالجا وأ درفلا هذختي فقوم هرهوج في ماعلا يأرلا دعي ةيوبرت تماكارتو ،ةيرثك تانوكم لىع هسسأ في موقي وهف اذل ،ةشاعلما ةايلحا تاقايس في لصيح فيو ،عمتمج يلأ يعماتجلاا لعفلا ةيصوصخ تاقايس بسحب يرسي ايرطف نوكي ام اهنم ،ةيفاقثو يعولا ةلاح تيبثت ديرت تاهج نم ةلعتفمو ةعنطصم تايطعمب اهيريست وأ اهذحش متي ىرخأ نايحأ ليكشت ةيلمع تنترقا ذل ،ةثدالحا كلت مهف ةأطو ليلقت وأ يريغت وأ فرح وأ ينعم مهف لىع ،يعمتجلما ةعيبط بسحب ،اهرفاوت ةروضرو اتهوقو اتهدش في فلتتخ ،ةعونتم تاودأو تاددحمب ماعلا يأرلا اهنكتم ،ةرهاظو ةنماك تاودلأ يرثأتلا تاهج كلاتما رادقمو هتوقو ثدلحا ةعيبط نع لاضف ،عمتجلما . هفرح وأ ماعلا يأرلا ليكشت ةداعأ نم ةناماو قدصب اهرودب موقت نا ةفلتخلما ملاعلاا لئاسو لىع ضرفت ملاعلاا تايقلاخا نا رابخا نم همدقت ام للاخ نم ملاعلاا لئاسو تحبصا ةقحلاتلما ثادحلال ةجيتن نكل ، ةيعوضومو نع لاضف اهفلاتخاو ءارلاا ددعت ببسب للضم ماع يأر ليكشت لىا يرهمالجا ةدايق لواتح تامولعمو ةيلمع لىع موقت ،قارعلا اهنم صخلأابو انتاعمتمج في ماعلا يأرلا عنص ةيلمع نا ماك ،حلاصلما براضت ،يربكلا فياقثلا حاتفنلإا عم تمهسا دق ثادحلأا ةبوعص كلذك تلاخدلما في ةوقلا ةديدش شيوشت تتاب ذا ،شيوشتلا كلذ لكل سيسأتلا في ،ةفلتخلما ملاعلإا لئاسو اهتنبت يتلا ةيعاصرلا ةلالحاو قيقحتل ةدع تلاماتساو بيلاسلأ اهفيظوت برع يملاعلإا ليلضتلا ةيلمع سراتم ملاعلاا لئاسو ماعلا يأرلا لىع رثؤت وا عدتخ نا ةنيعم ةلاسر لاصيا برع نكمي ذا مدقلما يملاعلإا طاشنلا نم فدلها ةلكشم نإف هيلع و ،ةفلتخلما ةيملاعلإا داولما برع دمع نع ةللضم وا ةزاحنم تامولعم شرنب كلذو :يه تلاؤاست في تروحتم دق ثحبلا ؟ةفلتخلما ملاعلاا لئاسو في روهملجا هل ضرعتي يذلا ىوتحلما في يملاعلإا ليلضتلا تاشرؤم ام ؟ماعلا يأرلا ليكشت في يرثأتلل يملاعلإا ليلضتلا في ةمدختسلما بيلاسلأا ام لئاسو اهسراتم يتلا ليلضتلا بيلاسأ نع فشكلاب ثحبلل سياسلاا فدلها لثتم ينح في ثحبلا نم فدلها قيقتح لىا لوصوللو ،ماعلا يأرلا في يرثأتلل ةمدقلما تامولعلما برع ملاعلاا بيلاسأ ةفرعم لىا لوصولل نايبتسلاا ةادأب ةناعتسلاا برع يحسلما جهنلما لىع ناتثحابلا تدمتعا دادغب ةنيدم روهمجب لثمتي ثحبلا عمتمج امأ ،ماعلا يأرلا في اهيرثأتو يملاعلإا ليلضتلا ةسرامم
Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
مشكلة البحث واهميته:-
اخذ موضوع العولمة قدراً وافياً من الاهتمام سواء على المستوى الاكاديمي او على مستوى اجهزة الاعلام والرأي العام ومختلف التيارات السياسية والاقتصادية والاجتماعية ، فلا يخلو أي لقاء اقتصادي او سياسي او اجتماعي من الحديث عن العولمة اذ نشرت العديد من الابحاث والدراسات وعقدت الكثير من الندوات والمؤتمرات لدراسة العولمة وبيان اثارها ولعل ذل
... Show MoreThis study aimed at analyzing and studying the strategic and geopolitical importance of the Sahel region, which increased the regional competition for the resources of the region, especially the energy resources that have been and continue to be one of the axes of conflict and competition between these forces.
The researcher tried to review the competition between the international force, France, the United States of America, China, Algeria and Libya, and the African coast. We note that there is a positive correlation between the severity of the conflict and the intensity of the competition of the major powers to control the countries of the region and the extent of political and economic stability These countries are directly affecte
Consider the (p,q) simple connected graph . The sum absolute values of the spectrum of quotient matrix of a graph make up the graph's quotient energy. The objective of this study is to examine the quotient energy of identity graphs and zero-divisor graphs of commutative rings using group theory, graph theory, and applications. In this study, the identity graphs derived from the group and a few classes of zero-divisor graphs of the commutative ring R are examined.
Highlights the role of taxes in being a major source of funding sources internal economic and social development, and then, any decrease in tax revenue caused by tax evasion, for example, would weaken the government's ability to finance their investments and core financing private sector investment as a result of reduced ability to increase their reserves's cash banks, as well as the weakening of the effectiveness of tax evasion taxes as a tool to guide economic activity in the framework of service for development, and to achieve justice. And the statement of the reasons for and methods of evasion mandated to pay the tax due on them, whether legitimately or illegal with the statement of the proposed methods to tackle tax evasion and elim
... Show MoreAbstract
The developments of technology and information that is sweeping the world based on the factors of pressure on the accounting profession in general, and the authors of the accounting information. That becouse the makers of administrative decisions have become in need of new information fit and the environmental situation of the new competition and try to enter new markets,
... Show Moreاضاءات على الانتخابات الشريعية في العراق عام 2010
The Arab economy suffers from many structural imbalances problems which are getting complicated by the appearance of the world economic variables.
This change held risky challenges for the Arab economies in the light of unsuitable regional and international conditions. Since that it has been very essential for the Arab experts, especially those related to economy and politics, to face those new challenges or, at least, adapt with them believing that they can have both positive and negative impacts on the Arab economy.
This study has acquired its importance in the light of the critical levels the Arab economy reached out of the world economic variables, resulting in long-term
... Show MoreWatermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show More