Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThe Tigris River, a vital water resource for Iraq, faces significant challenges due to urbanization, agricultural runoff, industrial discharges, and climate change, leading to deteriorating water quality. Traditional methods for assessing irrigation water quality, such as laboratory testing and statistical modeling, are often insufficient for capturing dynamic and nonlinear relationships between parameters. This study proposes a novel application of the Gravitational Search Algorithm (GSA) to estimate the Irrigation Water Quality Index (IWQI) along the Tigris River. Using data from multiple stations, the study evaluates spatial variability in water quality, focusing on key paramete
Longitudinal data is becoming increasingly common, especially in the medical and economic fields, and various methods have been analyzed and developed to analyze this type of data.
In this research, the focus was on compiling and analyzing this data, as cluster analysis plays an important role in identifying and grouping co-expressed subfiles over time and employing them on the nonparametric smoothing cubic B-spline model, which is characterized by providing continuous first and second derivatives, resulting in a smoother curve with fewer abrupt changes in slope. It is also more flexible and can pick up on more complex patterns and fluctuations in the data.
The longitudinal balanced data profile was compiled into subgroup
... Show MoreVariable selection is an essential and necessary task in the statistical modeling field. Several studies have triedto develop and standardize the process of variable selection, but it isdifficultto do so. The first question a researcher needs to ask himself/herself what are the most significant variables that should be used to describe a given dataset’s response. In thispaper, a new method for variable selection using Gibbs sampler techniqueshas beendeveloped.First, the model is defined, and the posterior distributions for all the parameters are derived.The new variable selection methodis tested usingfour simulation datasets. The new approachiscompared with some existingtechniques: Ordinary Least Squared (OLS), Least Absolute Shrinkage
... Show MoreThe current world is observing huge developments in presenting the opportunity for organizations and administrative units to use information and communication technology and their adoption by administrative work due to its importance in the achievement of work with higher efficiency, speed, and facility of communication with all individuals and companies using various means of communication Depending on the Internet networks. Therefore, the research dealt with the study of electronic systems designed and adopted in the creation or construction of a database for archiving data, which is the main method in organizations and administrative units in developed countries. Where this system works to convert documents, and manual processes and t
... Show MoreThere is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into
... Show MoreThe strategic approach had a great effect on information technology analysis which relevant to business organizations. The role was explicated, through uses of the strategic leadership for these approaches to support the strategic capabilities (powers) and its contribution to reach the advantage and superiority strategy. This paper was attempt to reveal the strategic philosophy or strategic talent mind had a big role on confrontation the strategic risk and challenges. The paper was concluded by represents a wide perspective for the information technology and its effects on organizations strategic role. The topic can be considered as a rational and reasonable contribution, in addition to the opportunist pragmatic analysis will sup
... Show Moreان تقدير مسؤولية المحاسب في تصميم نظام المعلومات المحاسبي من منظور تاريخي سبقت استخدام الحاسوب كأداة معلوماتية للاعمال، لما له من رؤيا بالتطورات الرئيسية لنظام المعلومات والتي اهمها تحديد متطلبات مستخدمي المعلومات وتعيين مضمون وشكل مخرجات النظام من التقارير وتحديد مصادر البيانات وانتقاء القواعد المحاسبية الملائمة فضلاً عن الرقابة الضرورية لتكامل وفاعلية النظام.
ان النظم المحاسبية التقليدية غالبا
... Show Moreيرجع تاريخ الاصلاحات الادارية إلى سبعينات القرن الماضي ،ولاسيما الندوة التي عقدت لبحث العوامل المؤثرة في انخفاض الانتاجية عام 1976، وعملية ترشيق الاجهزة الادارية للدولة عام 1987.
ان بحثنا الموسوم (نظام المعلومات المحاسبية ودوره في عملية اتخاذ القرارات) يتم عرضه في فرعين مترابطين، هما:
- المحاسبة نظام معلومات.
- الادارة صانعة للقرار.<
This study aimed to identify the perceived mental image of volunteering, and its relationship to volunteer motivation among a sample of Al-Quds Open University students, as well as to identify the differences in the perceived mental image of volunteering due to variables (gender, year of study, place of residence, college). The researcher has used relational descriptive approach. The researcher has used two questionnaires, the first was used to measure the perceptive mental image of volunteering, and the second to measure the motivation towards volunteering, and the study population may consist of all students of Al-Quds Open University Hebron Branch during the first semester of the academic year 2021/2020 and their number (3462)Male and
... Show More