Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreThe present study aims to identify wisdom-based thinking and its relationship to psychological capital. It further aims to find out the differences in the level of wisdom-based thinking and psychological capital according to the variables of gender and specialization (scientific, humanities). To achieve this, the study has been conducted on a sample of (380) male and female students. The two scales, wisdom-based thinking and psychological capital are implemented to the sample after being constructed by the researcher and after ensuring their psychometric characteristics' suitability for the study's aims. Results concerning the first aim have shown that there is a significant relationship among students. The second aim has revealed that t
... Show MoreABSTRACT : Fifteenth isolates of C. sakazakii were obtained from previous studies of the sample (infant formula, cerebrospinal fluid and blood). All isolates C. sakazakii identification based on microscopic, biochemical test and confirmed by 16SrRNA. We studied the movement of all isolates and study adhesion to polystyrene plate, adhesion and invasion to Esophageal adenocarcinoma (SKG-GT-4) for four isolates [Cerebrospinal fluid (CSF5), Bloods (B 1), Dialak (A1c), Novolac Allernova (C1)] and its cytotoxicity. Results showed that all isolates can move after 4 hours of incubation and increased after 8 hours, the isolates moved to different distances strong, medium, and weak. The results showed that the number of C. sakazakii colony adherent t
... Show MoreThe formation of the identity of the ego associates with adolescence and the beginnings of youth, where represents the basic requirement for growth. This stage reflects a turning point towards the necessary autonomy for the growth of normal in adulthood that needs the ego growth from his point of view to pass eight consecutive stages of the individual faces in each particular crisis. It is determined by its growth path depending on the nature of solved positively or negatively, influenced by several factors: biological, social, cultural, personal, and a dogmatic obstacle to personal thinking which refers to the kind of sclerotic thought a bigot to the inside of obsolete beliefs refuse to discuss and consider. The final idea is debatable
... Show MoreThe aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial
... Show MoreThis article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.