Preferred Language
Articles
/
bsj-7926
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Development of Iraqi License Plate Recognition System based on Canny Edge Detection Method
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Fri Mar 14 2025
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Mar 14 2025
Journal Name
Iraqi Journal For Administrative Sciences
قياس الكفاءة التقنية لوحدات اتخاذ القرار باسلوب التحليل التطويقي للبيانات ( DEA) بحث ميداني في الشركة العامة للنقل البري
...Show More Authors

this research aims it measure the technical efficiency of the branches of the General Company for Land Transport, That scattered geographically at country level, by Data Envelopment analysis (DEA) technique, as this technique relies on measuring the efficiency of a set of asymmetric Decision making units, which is one of the nonparametric mathematical methods for and application related to Linear Programming, and this is what helps the General Company for Land Transport to diagnose its branches performance by benchmarking with each other and determine the performance gap. The research found that there is variation in the level of efficiency in the company's branches

View Publication
Publication Date
Fri Jan 01 2021
Journal Name
الرك للفلسفة واللسانيات والعلوم االجتماعية
فاعلية المواقع الالكترونية للصحف العراقية في تعزيز القيم الايجابية لدى المجتمع ( دراسة مسحية لعينة من جمهور مدينة بغداد )
...Show More Authors

اصبحت وسائل الاعلام في ظل المتغيرات الجديدة قادرة على صياغة وعي وثقافة وهوية الشعوب الى حد كبير في المجتمعات المعاصرة , وذلك نظرا لما تتمتع به من اليات مختصة في التأثير والمتمثلة عموما في التكرار المتنوع للرسالة الاعلامية وقدرة الخطاب الاعلامي في معالجة القضايا المختلفة فضلا عن تقديم المعلومات وغزارتها وشرحها المستفيض , وقد بات من الواضح جدا مدى التأثيرات الكبيرة التي من الممكن ان يحدثها تعرض الافراد للمواق

... Show More
Publication Date
Sun Jan 05 2014
Journal Name
Journal Of Educational And Psychological Researches
العملية – التعلمية في عصر الانترنت والصعوبات التي تعيق استعماله " دراسة اجريت على عينة من طالبات كلية التربية للبنات "
...Show More Authors

The study aims to introduce at the difficulties in which delay the using of the internet In the educational process – learning , Study was conducted on a sample of students in the College of Education for Girls and the effects of variables : possession of computer , availability of the internet service , and the level of parents on these difficulties ,  Used for this purpose, a total sample size (400) students, distributed Departments . Results showed that the most important difficulties in which delay using of internet were : Lack of knowledge of internet availability , Lack of knowledge of the aim of using this service , and the students satisfaction that the disadvantages is more than the advantages of

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
مجلة جامعة دمشق للعلوم التربوية والنفسية
طبيعة العلاقة الارتباطية بين التعاطف والسلوك العدوانيدراسة نيدانية لدى عينة من طلبة المرحلة المتوسطة في مدارس بغداد الرسمية
...Show More Authors

استهدفت الدراسة الحالية تحديد طبيعة العلاقة الارتباطية بين التعاطف والسلوك العدواني لدى عينة من طلبة المرحلة المتوسطة. تكونت العينة من طلبة الصف الأول المتوسط بغداد/ تربية الرصافة الثانية من كلا الجنسين، شملت 218 طالباً وطالبة، وطبق مقياس التعاطف، ومقياس السلوك العدواني. وبعد معالجة البيانات، أظهرت النتائج تمتع طلبة الصف الأول المتوسط بالنزعة أو الميل للتعاطف، وتبين أن الإناث أكثر تعاطفاً من الذكور، ومستوى

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 19 2018
Journal Name
Arab Science Heritage Journal
دور دور( أبي القاسم قائم مقام )في القضاء على المتنافسين على العرش وتنصيب محمد ميرزا شاهاً على إيران
...Show More Authors

  Abu Al- Qasim Qa ,im Maqam is famous figure in political life of lranian; The life of Abu Al- Qasim Qa ,im Maqam is full of incidents and conflicts in the period of the expansion of foreign influence in lran Abu Al- Qasim Qa ,im Maqam has an important role in the history of Iran Modern political considered him one of the most prominent leaders to the unified Arabian nationalistic liberating Abu Al- Qasim Qa ,im Maqam   raised in the history of the Qajar .

 

 

View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Basic Education
اسباب الضعف الاملائي لدى طلبة كلية الادارة والاقتصاد في جامعة بغداد وطرائق معالجتها من وجهة نظر التدريسيين والطلبة
...Show More Authors

Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Educational And Psychological Researches
اثر طريقة الملاحظات الصفية باستخدام الحاسوب( كمنشطات عقلية) في التحصيل الدراسي لمادة الفيزياء لدى طالبات الصف الأول المتوسط
...Show More Authors

The research aim to know the effect of note–taking by computer method as amentalactivators in achievement of physics subject for the first intermediate class students.

To investigate from aim of the research the research sample was chosen from the first intermediate class students in Al–mutamyzat secondary school for girls. Which belongs to the general administration for the second karkh education which randomly chosen from (9) schools for distinct female students in Baghdad. Then randomly chosen two sections form three about (80) female students at (66.667%) from total sample it’s about (120) female student in the three sections. The randomly chosen too, section (a) to represent experimental group it’s about (41) female

... Show More
View Publication Preview PDF