Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
The manifestations of climate change are increasing with the days: sudden rains and floods, lakes that evaporate, rivers that experience unprecedentedly low water levels, and successive droughts such as the Tigris, Euphrates, Rhine, and Lape rivers. At the same time, energy consumption is increasing, and there is no way to stop the warming of the Earth's atmosphere despite the many conferences and growing interest in environmental problems. An aspect that has not received sufficient attention is the tremendous heat produced by human activities. This work links four elements in the built environment that are known for their high energy consumption (houses, supermarkets, greenhouses, and asphalt roads) according t
... Show MoreThe policy issue in all countries of the world is concerned with government and research because it has the ability to reveal many of the problems facing the state and its organizational and scientific capabilities in the development of solutions and appropriate treatments that go beyond random and improvisational reactions, As a result of this interest, many studies have attempted to conceptualize and academicism it. The concept of public policy has been linked to various aspects of social life such as social, economic, educational, agricultural or other aspects. Public policy, regardless of its meaning or its relation to aspects of life, refers to the systematic thinking that directs the behavior and actions of the state, organization
... Show MoreIris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin
... Show MoreThe aim of this paper is to study the combined effects of the concentration and the thermo-diffusion on the unsteady oscillation flow of an incompressible Carreau fluid through an inclined porous channel. The temperature is assumed to affect exponentially the fluid's viscosity. We studied fluid flow in an inclined channel under the non-slip condition at the wall. We used the perturbation series method to solve the nonlinear partial differential equations. Numerical results were obtained for velocity distribution, and through the graphs, it was found that the velocity of fluid has a direct relation with Soret number, Peclet number, and Grashof number, while it has a reverse variation with chemical reaction, Schmidt number, frequency of os
... Show MoreArtificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show MoreArtificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show MoreThe major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R2) is 0.077 m observed in Northing. While in
Chapter One : the importance of research and the need for it .
He has developed the concept of the curriculum has evolved as other educational concepts . Because the world has become a small village due to modern technology and are used in various aspects of life , and the rapid communication between the world can be accessed easily and conveniently . And that the purpose of education citizens who create social functions which ones to keep the culture , upgrade and repair flaws, and aims to develop the capacity of the individual and the preparations in the footsteps of scientific and technological development .
- The goal of research : The research aims to:
1 . What is the
This article focuses on the relationship of gender to the effectiveness of both women and men in public relations work. Its aim is to identify the extent to which public relations employees are aware of the concept of gender, and to reveal the role of the institution in determining certain roles for both women and men at work, as well as to find out which employees are most effective in public relations activities within the institution.
The researcher uses public relations employees and officials in Iraqi ministries as a research sample to capture the point of view of both parties on the effectiveness of workers in public relations based on the definition of gender. The sample consists of 396 individuals
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show More