Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
Around 65 million individuals suffer from epilepsy worldwide, and when it is not properly treated, it is linked to higher rates of physical harm and mortality. Due to the requirement for long‐term therapy and the side effects of many medications, medication compliance is a significant issue. The purpose of this review was to summarize the findings of previous studies examining the quality of life (QOL), adherence, patient education, and medication knowledge, as well as the impact of a pharmacist‐led educational intervention. Additionally, to find out if these studies benefit epileptic patients, to find the appropriate method used to help them in all aspects of their lives, and to use these in future studies. A systematic and comprehensi
... Show MoreDiabetes mellitus represents a chronic illness distinguished by sustained elevations in blood glucose concentrations, and it ranks as the sixth foremost cause of mortality globally.
This randomized controlled experimental study was conducted consisted of 105 patients divided into three groups (36 vibration group, 38 coughing technique group, and 31 control group) who applied subcutaneous insulin injections in hospitalized adults’ patients with type 2 diabetes between September 2024 and January 2025 to examine the effect of the cou
Background: Coping skills play a vital role in managing the physical and psychological effects of breast cancer (BC). Despite improvements in early detection and treatment, Breast cancer survivors continue to face long-term challenges after diagnosis. Therefore, this study aims to evaluate the coping skills employed by breast cancer women in Iraq and to identify the sociodemographic, clinical, and psychological factors associated with these coping skills. Methods: A cross-sectional study was conducted among 244 breast cancer women in The Medical City Teaching Oncology Hospital, Baghdad, Iraq, from August 2023 to October 2023, coping skills and psychological factors were assessed using the BRIEF COPE-28, and Hospital Anxiety Depression scale
... Show Moreالمستخلص يهدف هذا البحث الى تجاوز مشكلة البعدية من خلال طرائق الانحدار اللامعلمي والتي تعمل على تقليل جذر متوسط الخطأ التربيعي (RMSE) , أذ تم استعمال طريقة انحدار الاسقاطات المتلاحقة (PPR) ,والتي تعتبر احدى طرائق اختزال الابعاد التي تعمل على تجاوز مشكلة البعدية (curse of dimensionality) , وان طريقة (PPR) من التقنيات الاحصائية التي تهتم بأيجاد الاسقاطات الاكثر أهمية في البيانات المتعددة الابعاد , ومع ايجاد كل اسقاط
... Show MoreDeep learning techniques are applied in many different industries for a variety of purposes. Deep learning-based item detection from aerial or terrestrial photographs has become a significant research area in recent years. The goal of object detection in computer vision is to anticipate the presence of one or more objects, along with their classes and bounding boxes. The YOLO (You Only Look Once) modern object detector can detect things in real-time with accuracy and speed. A neural network from the YOLO family of computer vision models makes one-time predictions about the locations of bounding rectangles and classification probabilities for an image. In layman's terms, it is a technique for instantly identifying and recognizing
... Show MoreKnowledge of the distribution of the rock mechanical properties along the depth of the wells is an important task for many applications related to reservoir geomechanics. Such these applications are wellbore stability analysis, hydraulic fracturing, reservoir compaction and subsidence, sand production, and fault reactivation. A major challenge with determining the rock mechanical properties is that they are not directly measured at the wellbore. They can be only sampled at well location using rock testing. Furthermore, the core analysis provides discrete data measurements for specific depth as well as it is often available only for a few wells in a field of interest. This study presents a methodology to generate synthetic-geomechani
... Show MoreDeep learning techniques are used across a wide range of fields for several applications. In recent years, deep learning-based object detection from aerial or terrestrial photos has gained popularity as a study topic. The goal of object detection in computer vision is to anticipate the presence of one or more objects, along with their classes and bounding boxes. The YOLO (You Only Look Once) modern object detector can detect things in real-time with accuracy and speed. A neural network from the YOLO family of computer vision models makes one-time predictions about the locations of bounding rectangles andclassification probabilities for an image. In layman's terms, it is a technique for instantly identifying and rec
... Show MoreThe present research aims to identify and define the basic dimensions of the information management strategy and the administrative creativity in the Faculty of Management and Economics / the University of Kirkuk, as well as the role played by the dimensions of the information technology management strategy in achieving the administrative innovation in the college and the research problem was formulated in several questions. The research problem was formulated in several questions centered on the correlation between the research variables, and the research was based on a major hypothesis and five sub-hypotheses emerged from which it was subjected to several tests to ensure its validity. The researcher used the descriptive-analyti
... Show More
Concentrated research topic in addressing variable vital to the work of offices of inspectors general, construction and scale effectiveness and efficiency is the organizational structure, which are important as is obvious to any researcher in the management and organization and this variable would affect the exercise task supervision and inspection of financial and administrative corruption and combat efficiently, Thus this effect will be placed in the fold ability to achieve goals. That the creation of the organizational structure and requirements to achieve harmony between its properties is creating step towards success. This research aims to analyze the characteristics and style o
The current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show More