Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
The principal components analysis is used in analyzing many economic and social phenomena; and one of them is related to a large group in our society who are the university instructors. This phenomenon is the delay occurred in getting university instructor to his next scientific title. And as the determination of the principal components number inside the principal components depends on using many methods, we have compared between three of these methods that are: (BARTLETT, SCREE DIAGRAM, JOLLIFFE).
We concluded that JOLLIFFE method was the best one in analyzing the studying phenomenon data among these three methods, we found the most distinguishing factors effecting on t
... Show Moreيهدف هذا البحث الى عرض رؤيا تشخصيه لمجتمع المعرفة في ظل اقتصاد المعرفة من خلال استعراض العديد من المفاهيم النظرية والعلاقة بينهم كمفهوم البيانات والمعلومات والمعرفة ومجتمع المعلومات والمعرفة, ومصادر المعرفة, والمراحل التطورية للتحول الى مجتمع المعرفة, ومن ثم استعراض الأبعاد الأساسية لمجتمع المعرفة, إضافة إلى الملامح الأساسية لاقتصاد المعرفة وخصائص ذلك الاقتصاد, ثم تناول البحث المورد المعرفي وعلاقته
... Show MoreThis paper discuses the mindset contribution of the organization Science in organizational effectiveness (OE), and the most valuable thoughts they introduced in this subject, starting from the pre- classical era, through classical era to present time. This paper has identified the main contribution in OE. The concept of OE didn’t arise until what had been introduced by Chester Barnard, although Max Weber mentioned this concept in his bureaucratic theory, but he didn’t explain it as Barnard does. After that no clear focus was pointed to this subject until Peter Drucker did so, which considered as the main participant in OE after Barnard. After that many researchers be interested in OE and they start studying this subject like
... Show Moreيهدف هذا البحث الى تحديد اثر الاختلاف في ادراكات العاملين للعدالة التنظيمية في المنظمات قيد البحث. وقد تم اعتماد الادراك كمتغير تفسيري، اما العدالة التنظيمية فمثلت المتغير الاستجابي بانواعها الثلاث (العدالة التوزيعية، العدالة الاجرائية، والعدالة التفاعلية)، ولتحقيق اهداف البحث فقد تم اختيار دائرة صحة بغداد/ الكرخ مجتمع للدراسة. وجرى تصميم استبانة ووفق مقياس خماسيي الدراجات وجرى تحليل البيانات باستخ
... Show MoreIn this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreThe purpose of the research is to present a proposed accounting system model for converting and aggregating accounting information within the framework of the differentiated accounting systems, and the research methodology consists of: The research problem is the existence of differentiated and dispersed accounting systems that operate within governmental economic units and at the same time seek to achieve a unified vision and goals for the organization, and the central research hypothesis is the possibility of conducting the process of conversion accounting information from the government accounting system to the unified accounting system, and then aggregate those systems. The research was conducted at the College of Administrat
... Show MoreAbstract
This study aims at identifying the impact of the application of IFRS 15 "Revenue from contracts with customers on the quality of financial reporting, through application to faculty members in the accounting departments of Iraqi universities and auditors. The problem of the study was the multiplicity of accounting rules and standards Which deals with the issues of revenue recognition , as well as the lack of consistency of most of them with the common framework of financial accounting, which results in low quality of financial reporting in the current financial statements, where the formulation of one hypothesis was the lack of relationship of significant significance The application of IFRS 15 "Recognition of rev
... Show MoreMRP is a system intended for the batch manufacturing of discrete parts including assemblies and subassemblies that should be stocked to support future manufacturing needs. Due to the useful information provided by MRP it has evolved into a Manufacturing Resources Planning, MRP II, a system that ties the basic MRP system to the other functional areas of the company such as marketing, finance, purchasing, etc. The objective of this research, which was conducted at the State Company for Batteries Manufacturing, is to test the performance of some popular lot-sizing techniques used within MRP II framework. It is hypothesized that the technique which minimizes the total inventory costs does no
... Show MoreThis research has taken to the knowledge of the scope of applying the international specification of (ISO 10015) which is regarded to training by the Iraqi ministry of municipalities and public works ,in order to determine its training quality .By using the checklist made based upon the items of the specification ,after translating the English copy into Arabic ,which takes the indications of training depending on qualitative bases. The results of the analysis emphasized that occurred total average by comparison the evaluation of the training activity in the mentioned ministry with the international specification in all of its main items, which was (%55) ,and totally documented ,which finally refer to the existence of great
... Show MoreThe purpose of this paper is use the Dynamic Programming to solve a deterministic periodic review model for inventory problem and then to find the optimal policies that the company must uses in the purchase or production (in the practical application example the Al Aksa company purchase the generators from out side country).