Preferred Language
Articles
/
bsj-7926
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2006
Journal Name
Journal Of The College Of Languages (jcl)
L'image de l'Arabe et l'attitude d'Albert Camus envers la question algérienne dans sa nouvelle "L'Hôte" de son recueil "L'Exil et le Royaume" : Une étude analytique
...Show More Authors

Parmi les oeuvres d'Albert Camus, qui s'éloignent un peu de sa
tendance générale qui traite les thèmes de l'absurde ,du néant et de la
question de la mort , on trouve son recueil "l'Exil et le Royaume" 1957
qui contient six nouvelles qui sont d'une invention moins épouvantable
(le Renégat , la Femme adultère , les Muets , le Pierre qui pousse , l'Hôte
et Jonas). Ces nouvelles , à l'exception du "Renégat" , ne provoquent pas
les questions philosophiques et dialectiques qui dominent la plupart des
oeuvres d'Albert Camus , Mais ces nouvelles traitent tout simplement la
question d'homme exilé dans son existence et sa recherche perpétuelle
de son royaume.

View Publication Preview PDF
Publication Date
Sun Oct 02 2011
Journal Name
Journal Of Educational And Psychological Researches
اثر استخدام قبعات التفكير الست على اكتساب المفاهيم التاريخية واستبقائها لدى طالبات الصف الرابع الادبي في مادة التاريخ
...Show More Authors

Problem: Find dimensions of the problem by answering the following question: what the effect of using the Six Thinking Hats strategy to acquire the historical concepts and retain the fourth-grade students in the subject of literary history. Importance of research: current research is gaining importance in many ways, including: 1. Keep pace with the new in the field of education and modern educational strategies. 2. Shed light on innovative education strategy in the teaching of history, which is one of the materials that need to renew the tragedy of instruction methods for students. 3. Out of the monotony and traditional way of teaching to a method and a new strategy to develop the teacher and the learners thinking skills through various

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 08 2019
Journal Name
Arab Science Heritage Journal
استخلاص عامل التلزن ( اللكتين ) من بكتريا لخلاياEnterococcus faecalis EM1 ودوره في تلزن انواع من البكتريا السالبة لملون غرام
...Show More Authors

استخلص عامل التلزن من E. faecalis EM1 بعد تكسير بالكرات الزجاجية والترسيب بالكحول الاثيلي , واجري فحص التلزن وقياسه لمستخلص لخلايا  E. faecalis  مع انواع من البكتريا السالبة لصبغة غرام تضمنت     Escherichia coli  و Klebsiella  pneumonia  و Serratia marcescens   و Pseudomonase aeruginosa و Salmonella typhi , بينت النتائج ان اعلى نسبة تلزن للخلايا والمستخلص تكون مع بكتريا    ٍK. Pneumonia  حيث بلغ66.5 % مقارنة بالسيطرة79.5 % , واوطا قيمة للتلز

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (2)
Scopus
Publication Date
Sun Jan 01 2023
Journal Name
The Egyptian Journal Of Hospital Medicine
The Antimicrobial Activity of Melanin-Mediated Synthesis of Silver Nanoparticles
...Show More Authors

Background: Nowadays, the environmentally friendly procedures must be developed to avoid using harmful compounds in synthesis methods. Their increase interest in creating and researching silver nanoparticles (AgNPs) because of their numerous applications in many fields especially medical fields such as burn, wound healing, dental and bone implants, antibacterial, viral, fungal, and arthropodal activities. Biosynthesis of nanoparticles mediated pigments have been widely used as antimicrobial agent against microorganisms. Silver nanoparticles had synthesized by using melanin from locally isolate Pseudomonas aeruginosa, and used as antimicrobial activity against pathogenic microorganisms. Aim of the study: Isolation of Pseudomonas aeruginosa

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (4)
Scopus
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
الإبلاغ المالي عن المشتقات المالية بوصفها أدوات للتحوط من المخاطر السوقية وفقاً للمعايير المحاسبية الدولية: بالتطبيق في مصرف بغـداد
...Show More Authors

The research has  focused on accounting for marketing risks faced by banks because they are exposed to a high level of risk as a result of their great utilization of financial instruments, which may make them liable to insolvency or bankruptcy and collapse, and accordingly to major economic crises. Therefore, banks are required to manage (reduce) risks so as to prevent them. As Iraqi banks don't manage these risks according to modern methodology of using derivatives, as well as lack of both the standard accounting system for banks and the Iraqi accounting criterion (standard) No. 10 to an obvious methodology for these risks identification, classification, hedging and disclosure, the researchers was prompted to concentrate

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 22 2018
Journal Name
Arab Science Heritage Journal
الاميرة الأَميرة أَشرف بهلوي ودورها في التآمر على وزارة مصدق ومجيء قوام السلطنة (6 آيار 1951-22 تموز 1952)
...Show More Authors

      The name of princesses  Ashraf Bhlwi was associated with very important events influnced on social polical Iranian fact through second half of twentieth century, with access Dr.Mosaddeq to cabinet on May 1951, The conflict seemed between him and princesses Ashraf in creasingly, when Mosaddeq came to authority he had many projects deal with oil industry laws in Iran and reform the elections laws, reducing terms of reference of Al shah and made it honorable only,  This matter disturbance Royal court especially, Ashraf, she started to coordinate with members of the shura council and other military personalities in order to over throw Mosaddeq cabinet but she failed because Mosaddeq supported by Irani

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
خطة الصيانة الوقائية ومحاكاتها على وفق معايير هندسة المعولية دراسة حالة في الشركة العامة للصناعات الجلدية - معمل رقم 7-
...Show More Authors

This research is an attempt to study and evaluate the maintenance function at Factory 7 - The State General Company for Leather Industries, and to design a computerized preventive maintenance system to design and to analyze preventive  maintenance.  To accomplish the objectives of this research, data were gathered and analyzed according to the reliability engineering criteria for the period 2/1– 30/6/2005, then a preventive maintenance plan was designed for each machine of the sample study using the computerized system designed in this research. A Monte Carlo Simulation methodology was used for the purpose of evaluating the performance of the preventive maintenance plan of each machine for one year. The simulation res

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
An empirical Evaluation of the effect of service encounter on customer voluntary behavior: Exploration study of (TBI) customers
...Show More Authors

Purpose: To determine the impact of service encounter in stimulating voluntary customer behaviors.

  • Approach / methodology: It was selected a sample of customers Bank Iraqi Trade (TBI) was (105) individual, using a questionnaire designed in the light of previous studies, was drafted scale and tested in the light of a group of statistical methods developed (reliability coefficient, reliability coefficient composite, convergence). Then test hypotheses through structural equation modeling.
  • Results: The behaviors and characteristics of the service provider in effect urged bank customers to perform voluntary extra, as the service environment service encounter

... Show More
View Publication Preview PDF
Crossref