Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.
تعد أساليب وطرائق تدريس المواد الدراسية العلمية من المجالات المهمة التي تساعد في تحويل المجرد إلى ثوابت في الذهن وترفع مستوى خبرات كل من المعلم والمتعلم على حد سواء إضافة إلى إنها جزء لا يتجزأ من العملية التربوية ومن الركائز المهمة التي تقوم عليها المناهج الدراسية لأنها تساعد الطلبة على اكتساب مهارات ومعلومات وتكوين اتجاهات وميول تخدم أهداف تدريس المادة وبما أن مادة الكيمياء الكمية هي إحدى المواد الدراسية
... Show Moreان دراسة الدين العام في اقتصاد ريعي شديد الارتباط بسوق خارجية شديدة التقلب يعد من الدراسات الحساسة كونها تضع امام الباحثين القيود المالية التي سيتكبل بها اقتصاد ضعيف قليل التنوع يعتمد على سوق الطاقة مما يفقد حالة الاستدامة المالية وتفقد الدولة القدرة على الوفاء بالتزاماتها المالية ، ان الحدود الامنة للدين العام يجب ان تكون بنسبة لا تتجاوز 60% من الناتج المحلي الاجمالي حسب اتفاقية ماسترخت الخاصة بمجلس الاتحا
... Show MorePurpose: To determine the impact of service encounter in stimulating voluntary customer behaviors.
- Approach / methodology: It was selected a sample of customers Bank Iraqi Trade (TBI) was (105) individual, using a questionnaire designed in the light of previous studies, was drafted scale and tested in the light of a group of statistical methods developed (reliability coefficient, reliability coefficient composite, convergence). Then test hypotheses through structural equation modeling.
- Results: The behaviors and characteristics of the service provider in effect urged bank customers to perform voluntary extra, as the service environment service encounter
In this work, the effect of the addition of bright nickel plating and silver carried out by the electroplating method has been studied, on the coating of copper nanoparticles on the copper base metal via the process of thermal evaporation. The improvement of the solar absorber using CuNP in combination with the bright nickel and silver was obtained to be better than copper nanoparticles individually. A bright nickel enhanced the absorbed thermal stability. Also, other optical properties, absorptions, and emissivity slightly decreased from (93% to 87%), while the existence of silver had a slight impact on absorption of about (86.50%). On the other hand, thermal conductivity was evaluated using hot disk analyzer. The results showed a good
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreThe demand for single photon sources in quantum key distribution (QKD) systems has necessitated the use of weak coherent pulses (WCPs) characterized by a Poissonian distribution. Ensuring security against eavesdropping attacks requires keeping the mean photon number (µ) small and known to legitimate partners. However, accurately determining µ poses challenges due to discrepancies between theoretical calculations and practical implementation. This paper introduces two experiments. The first experiment involves theoretical calculations of µ using several filters to generate the WCPs. The second experiment utilizes a variable attenuator to generate the WCPs, and the value of µ was estimated from the photons detected by the BB
... Show Moreتهدف هذه الدراسة إلى معرفة الفرق في التحصيل الدراسي في الكيمياء والاتجاه نحو العلوم بين طلاب التخصص العلمي وطلاب التخصص الصناعي الصف الأول كلية التربية ابن الهيثم، كذلك تهدف الدراسة إلى معرفة العلاقة بين التحصيل الدراسي في الكيمياء ودرجات اختبار نهاية الفصل في الكيمياء، والمعدل التراكمي بعد أخذ المقرر الدراسي والاتجاه نحو العلوم بالنسبة لطلاب التخصص العلمي وطلاب التخصص الصناعي.
لقد است
... Show More