The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the Normalized cross Correlation (NC). The experiments shows the error ratio of the proposed technique is (8%) while accuracy ratio is (92%) when the Curvelet Transform (CvT) is …
Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreNowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show MoreThe research addresses the role of the digital economy in the growth of the Iraqi economy during the period from 2010 to 2022. The research is based on the hypothesis that the digital economy has become one of the primary growth drivers worldwide and has a close relationship with economic development. Therefore, the digital transformation in Iraq can accelerate bridging developmental gaps with other countries.
It has become evident that the Iraqi economy suffers from structural imbalances for various reasons, hindering economic growth. These reasons include political and economic factors, as well as the absence of a well-thought-out policy to promote the agricultural sector, which is considered one of the fundamental sectors capa
... Show MoreBackground: This study evaluated the influence of different fiber formulations incorporation in resin composite on cuspal deflection (CD) of endodontically-treated teeth with mesio-occluso-distal (MOD) cavities. Materials and Methods: Thirty-two freshly extracted maxillary premolar teeth received MOD cavity preparation followed by endodontic treatment using single cone obturation technique, and divided into: Group I: direct composite resin only using a centripetal technique, Group II: direct composite resin with short fiber-reinforced composite (everX Flow), Group III: direct composite resin with leno wave ultra-high molecular weight polyethylene (LWUHMWPE) fibers placed on the cavity floor, and Group IV: direct composite resin with LWUHMWP
... Show MoreDue to the great evolution in digital commercial cameras, several studies have addressed the using of such cameras in different civil and close-range applications such as 3D models generation. However, previous studies have not discussed a precise relationship between a camera resolution and the accuracy of the models generated based on images of this camera. Therefore the current study aims to evaluate the accuracy of the derived 3D buildings models captured by different resolution cameras. The digital photogrammetric methods were devoted to derive 3D models using the data of various resolution cameras and analyze their accuracies. This investigation involves selecting three different resolution cameras (low, medium and
... Show MoreThe Geographic Information System (GIS) is considered one of the most prominent programs used to collect, analyze, display, process, and produce geographic information maps for a specific purpose. It is also considered one of the modern database programs. Additionally, we can perform statistical analysis within GIS on predefined data to produce quantitative results. In this study, data was collected from more than 80 engineering projects established in Baghdad City from soil investigation reports for the projects. Geographic information systems were used to produce objective maps showing the variation in the bearing capacity of shallow foundations in the soil of Baghdad Governorate. I