Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.
Acinetobacter baumannii (A. baumannii) is a major opportunistic nosocomial pathogen, mostly resistant to several groups of antibiotics. Colistin is now used as a last-line treatment for isolates that are highly resistant. The purpose of this study is to identify the importance of LptD; which is involved in the translocation of LPS from the inner membrane to the outer membrane in compartment with LptA and LptC of A. baumannii and its indispensable role as a virulence factor, and the efficiency of colistin as a monotherapy. In the current research, two isolates of A.baumannii were used, the local isolate HHR1 isolated from urine sample and the global strain ATCC 17904, and three antibiot
... Show MoreThe research aimed to identify "the effectiveness of educational-learning design according to the model of brain compatibility in achievement among firstmiddle grade students in mathematics", in schools affiliated with the Second Karkh Directorate of Education. To achieve the goal of research, the following zero hypothesis has been formulated: " There is no statistically significant difference at the semantic level (05.0) between the average scores of experimental group students who will study with design accreditation (educational - learning) according to the brain compatibility model and the grades of control group students who will study in the usual way in the achievement thinking test". The research community, which is represented by
... Show MoreAbstract---The aim of the current research is to identify the level of logical reasoning skills in chemistry students at the Faculty of Education for Pure Sciences/ Ibn Al-Haytham for the academic year (2021-2022). The differences in their level of skills according to the gender variable (males and females) and the academic stages (first- second - third - fourth). The descriptive approach was adopted because it corresponds to the nature of the research objectives. The research sample consisted of (400 )students selected in a relatively random stratified way. The researcher constructed a logical reasoning test, which includes (6) sub-skills , which is (proportional - probabilistic- synthetic- deductive- logic- variable adjustment). The psych
... Show MoreIn a world of limited space, the owners are always surrounded by others next to them, and, consequently, there is hardly any activity which the owner may exercise on his land which would not affect the other owners. If he builds a building, that building may block the sun's rays or the air from the buildings next to it and owned by other people. And if he runs a business, the lands adjacent to that business may be overburdened with the accompanying noise or traffic. If oil is prospected in a land, the neighboring lands may be deprived of oil or their owners may be exposed to toxic fumes. Hence the importance of researching the intention of harming others, as it is one of the most important forms of abuse in the use of the right (especially
... Show MoreStudent performance may influence by several factors in all his study levels such as primary school, intermediate school and even in his college; some of these factors are psychological factors, social factors, and the factors which correlate with student environment.
In this paper we study some of these factors to discover their influence by using canonical correlation analysis to analyze the data. Many conclusions are discovered to help who focuses student performance or to make it pest in future.
In the age of information and communication revolution, education as one of life aspects has influenced with that revolution by integrating technology in education, which have become as an important learning tools of the whole educational process . Technology, when used appropriately, can help make science classroom a site of active learning and critical thinking, furthering student inquiry and connections with different materials. It is necessary to develop human rights education programs and materials for discretionary and extracurricular activities as it provide them with the skills and tools so that they are empowered to take action to realize their rights. Human rights education is a critical means of instilling the knowledge، skil
... Show MorePurpose: The purpose of the study is to compare and evaluate Earnings Management in Tunisia and Iraq. Theoretical framework: Earnings Management is an important topic that has been studied by a significant number of researchers, as well as those who are interested in the accounting profession. Earnings Management has gotten a lot of attention from academics, professionals, and other interested parties in recent years (e.g. Kliestik et al., 2020; Rahman et al., 2021; Gamra &Ellouze, 2021) Design/methodology/approach: The sample includes ten banks listed on the Bourse of Tunisia and Iraq Stock Exchanges for the year 2017. We have used a model of Kothari et al., (2005) as a tool to measure Earnings Management in both mark
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreResearch Summary :
Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, his family and all his companions, then after:
This is brief research that contained between its two covers one of the jurisprudence rules derived from Islamic Sharia that guarantees the right of others, in case of forcing to do the prohibited act, and it is a restriction of the rule: “Necessities allow prohibitions” and “Hardship brings facilitation” and support for the rule: “Necessities are valued.” It is an origin in alleviating the taxpayer definitely , and the study has briefly shown some of the jurisprudential appli
... Show MoreCollapsing building structures during recent earthquakes, especially in Northern and Eastern Kurdistan, including the 2003 earthquake in Cewlig; the 2011 earthquake in Van; and the 2017 earthquake near Halabja province, has raised several concerns about the safety of pre-seismic code buildings and emergency facilities in Erbil city. The seismic vulnerability assessment of the hospital buildings as emergency facilities is one of the necessities which have a critical role in the recovery period following earthquakes. This research aims to study in detail and to extend the present knowledge about the seismic vulnerability of the Rizgary public hospital building in Erbil city, which was constructed before releasing the seism
... Show More