Preferred Language
Articles
/
bsj-7926
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
The effect of dramatizing characters within the social subject of the basic education stage on student achievement
...Show More Authors

The researcher used the experimental approach due to its suitability and the nature of the research problem. The research community was represented by the eighth-grade students in the Rozak Elementary Mixed School affiliated with the General Directorate of Education in Erbil / the center, for the academic year (2021-2022), the number is (96) students, and the research sample consisted of (63) male and female students, with (31) in the experimental group, and (32) in the control group, and (11) students were excluded by (5) students from the experimental group, and (6) students from the control group, as the excluded, are students who failed and were absent from the lessons, and accordingly, the research sample became composed of (52) mal

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Effect of leadership patterns on the phenomenon of jop burnout among employees at Baghdad College of Economic Sciences University
...Show More Authors

This study deals with the impact of leadership styles in its three main dimensions (democratic, autocratic, lenient) as an independent variable of the dimensions of functional combustion (emotional stress, inhumanity, personal achievement). The research sought to achieve a set of goals, the most prominent of which are: studying the reality of the researched organization to identify the leadership patterns used in its management and its impact on the phenomenon of functional combustion, Moreover, knowing the extent of support for these established patterns and their contribution to mitigating the phenomenon of functional combustion in the organization's environment, and testing the impact of these leadership patte

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Physics: Conference Series
Manufacturing and studying the effect of partial substitution on the properties of the compound Bi<sub>2-x</sub> Ag<sub>x</sub>Sr<sub>1.9</sub>Ba<sub>0.1</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>10+δ</sub> superconductors.
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jul 29 2025
Journal Name
International Journal Of Engineering &amp; Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Development of Iraqi License Plate Recognition System based on Canny Edge Detection Method
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 04 2019
Journal Name
Journal Of Planner And Development
تقدير كمية الغاز الحيوي المنبعث من مناطق الطمر الصحي في المدينة العراقية الحالة الدراسية-مدينة الرمادي
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Jun 22 2022
Journal Name
Arab Science Heritage Journal
رسالة في تفسير قوله تعالى ﴿أَفَمَن شَرَحَ اللَّهُ صَدْرَهُ لِلإِسْلاَمِ﴾ للإمام الغزالي رحمه الله (دراسة وتحقيق)
...Show More Authors

The research aims to achieve a manuscript of Imam Al-Ghazali, may God have mercy on him, verify the attribution of this manuscript to the author, copy the text and serve it in a manner that suits the principles of scientific research in the investigation of manuscripts

View Publication Preview PDF
Crossref
Publication Date
Sat Sep 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
ادارة الطلب على المياه مدخل اساسي للتنمية المستدامة في الوطن العربي مع أشارة خاصة الى العراق
...Show More Authors

المقدمة:

مع مطلع القرن الحادي والعشرين فأن الصراع على امدادات المياه الحيوية هو خطر قائم على الدوام في جميع مناطق العالم حيث يتجاوز الطلب على الماء بشكل كبير العرض القائم ولكون اغلب المصادر الرئيسة للمياه وخاصة في المنطقة العربية يشترك فيها بلدان أو أكثر ولان هذه الدول نادرا ما توافق على الاجراءات التفاوضية الخاصة بأقتسام الامداد المتاح من المياه مما يعني زيادة الخلافات على الوصول الى الم

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 25 2024
Journal Name
مجلة السلام الجامعة
أحكام الزروع عند الإمام محمد بن الحسن الشيباني (ت189هـ) في روايته لكتاب الموطأ / دراسة فقهية مقارنة
...Show More Authors

ملخص البحث تناول البحث دراسة أحد أعمدة فقهاء العالم الإسلامي من حيث العموم والمذهب الحنفي بشكل خاص الإمام محمد بن الحسن الشيباني (رحمه الله تعالى) صاحب أبي حنيفة وفقيه العراق وبعض أحكامه الفقهية المتعلقة بالزروع، ولا يخفى اهتمامه الكبير وباعه الطويل في هذا الجانب، وحرص في الغالب على ذكر وجوه الترجيح، وأسباب الاختيار، واعتمد في ذلك على قواعد وضوابط تؤيد ما يرجحه أو يختاره، مع صياغة ذلك كله بأسلوب علمي رصين، ق

... Show More
View Publication