Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.
Growing interest in the subject of corporate governance after the repercussions of financial collapses of some of the leaders of American companies and European, and the consequent crisis of confidence in global financial lists of companies due to weak accounting disclosure and transparency, was quick from many countries and international organizations to adopt the concept in an attempt to improve the situation of companies and promote transparency and prevent further financial crises in the future. Based on this background, the present study aims to shed light on the concept of exercising the powers of governance that has become invitations for adoption in Iraq of great importance, given the increasing role of corporations both restrict
... Show MorePurpose: To determine the impact of service encounter in stimulating voluntary customer behaviors.
- Approach / methodology: It was selected a sample of customers Bank Iraqi Trade (TBI) was (105) individual, using a questionnaire designed in the light of previous studies, was drafted scale and tested in the light of a group of statistical methods developed (reliability coefficient, reliability coefficient composite, convergence). Then test hypotheses through structural equation modeling.
- Results: The behaviors and characteristics of the service provider in effect urged bank customers to perform voluntary extra, as the service environment service encounter
تعد أساليب وطرائق تدريس المواد الدراسية العلمية من المجالات المهمة التي تساعد في تحويل المجرد إلى ثوابت في الذهن وترفع مستوى خبرات كل من المعلم والمتعلم على حد سواء إضافة إلى إنها جزء لا يتجزأ من العملية التربوية ومن الركائز المهمة التي تقوم عليها المناهج الدراسية لأنها تساعد الطلبة على اكتساب مهارات ومعلومات وتكوين اتجاهات وميول تخدم أهداف تدريس المادة وبما أن مادة الكيمياء الكمية هي إحدى المواد الدراسية
... Show MoreIn this work, the effect of the addition of bright nickel plating and silver carried out by the electroplating method has been studied, on the coating of copper nanoparticles on the copper base metal via the process of thermal evaporation. The improvement of the solar absorber using CuNP in combination with the bright nickel and silver was obtained to be better than copper nanoparticles individually. A bright nickel enhanced the absorbed thermal stability. Also, other optical properties, absorptions, and emissivity slightly decreased from (93% to 87%), while the existence of silver had a slight impact on absorption of about (86.50%). On the other hand, thermal conductivity was evaluated using hot disk analyzer. The results showed a good
... Show MoreThis research is an attempt to study and evaluate the maintenance function at Factory 7 - The State General Company for Leather Industries, and to design a computerized preventive maintenance system to design and to analyze preventive maintenance. To accomplish the objectives of this research, data were gathered and analyzed according to the reliability engineering criteria for the period 2/1– 30/6/2005, then a preventive maintenance plan was designed for each machine of the sample study using the computerized system designed in this research. A Monte Carlo Simulation methodology was used for the purpose of evaluating the performance of the preventive maintenance plan of each machine for one year. The simulation res
... Show Moreيهدف هذا البحث إلى تأصيل الإستدلال بالقاعدة العقائدية، وبيان ضوابطه، وإبراز نماذج من أهم تطبيقاته المعاصرة، وقد أعتمد مناهج من أهمها المنهج الإستقرائي والمنهج المقارن ، وتناول البحث التعريف لقصص النبوة فى الأديان السماوية ، وعرض بعض الدراسات السابقة التى تناولت نفس الموضوع ، ثم تطرق البحث لذكر نماذج من قصص الأنبياء من الديانات السماوية الثلاث ، وتوصل البحث الى أن الأديان السماوية رغم بعض الإختلاف
... Show MoreResearch questions start from the fact that what the Arab origins of education indicted . First question are :
- To what extent the subject of assets acquired a specific meaning in the Arabic books and educational subjects ? Is these selections are reflected on the classification of assets and their types ?
- What’s the nature of the content ? .Is there a consistency between the meaning and content ?
- What entrances handling and curriculum approach and tactics are in those books ?
- Is the assets subject introduced within the grade best suited ?
&nb
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreThe demand for single photon sources in quantum key distribution (QKD) systems has necessitated the use of weak coherent pulses (WCPs) characterized by a Poissonian distribution. Ensuring security against eavesdropping attacks requires keeping the mean photon number (µ) small and known to legitimate partners. However, accurately determining µ poses challenges due to discrepancies between theoretical calculations and practical implementation. This paper introduces two experiments. The first experiment involves theoretical calculations of µ using several filters to generate the WCPs. The second experiment utilizes a variable attenuator to generate the WCPs, and the value of µ was estimated from the photons detected by the BB
... Show Moreتهدف هذه الدراسة إلى معرفة الفرق في التحصيل الدراسي في الكيمياء والاتجاه نحو العلوم بين طلاب التخصص العلمي وطلاب التخصص الصناعي الصف الأول كلية التربية ابن الهيثم، كذلك تهدف الدراسة إلى معرفة العلاقة بين التحصيل الدراسي في الكيمياء ودرجات اختبار نهاية الفصل في الكيمياء، والمعدل التراكمي بعد أخذ المقرر الدراسي والاتجاه نحو العلوم بالنسبة لطلاب التخصص العلمي وطلاب التخصص الصناعي.
لقد است
... Show More