Preferred Language
Articles
/
jcoeduw-726
Steganographic scheme to avoid statistical Steganalysis
...Show More Authors

significant bits either in the spatial domain or frequency domain sequentially or pseudo
randomly through the cover media (Based on this fact) statistical Steganalysis use different
techniques to detect the hidden message, A proposed method is suggested of a stenographic
scheme a hidden message is embedded through the second least significant bits in the
frequency domain of the cover media to avoid detection of the hidden message through the
known statistical Steganalysis techniques.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Effect of Strategic Control to Avoid the Strategic Pitfalls
...Show More Authors

This study identified intellectual and applied research in key variables (Strategic Control and Strategic Pitfalls) through internal dimensions then founded the (Federal Board of Supreme Audit) is the good area for analyzing the relationship and effect between variables by (125) questionnaire selected from (148) was distributed to the top and middle management as a seniors in controlling action. Appropriate methods, statistical tools, and programs were used to enhance the basic outputs, represented as a set of Conclusions and recommendations from the real control work with a specificity of potential Pitfalls in the effectiveness impact by Strategic Control in other dimensions which Studied.

View Publication Preview PDF
Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Steganalysis Using Image Quality Metrics (Structural Contents Metric)
...Show More Authors

A new method presented in this work to detect the existence of hidden

data as a secret message in images. This method must be applyied only on images which have the same visible properties (similar in perspective) where the human eyes cannot detect the difference between them.

This method is based on Image Quality Metrics (Structural Contents

Metric), which means the comparison between the original images and stego images, and determines the size ofthe hidden data. We applied the method to four different images, we detect by this method the hidden data and  find exactly the same size of the hidden data.

View Publication Preview PDF
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Basic Education
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg

... Show More
View Publication
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
Computation of Critical Submergence Depth to Avoid Surface Vortices at Vertical Pumps Intakes
...Show More Authors

The pumping station became widely used in many fields. Free surface vortices at intakes of pumps are not favorable. It may cause noise, excessive vibration, damage to the pumping structure, reduction in efficiency and flow for hydro-turbines, etc. One of the important problems encountered during the pump intake design is the depth of submergence and other design parameters to avoid strong free-surface vortices formation. This study aims to compute the critical submergence depth with some geometrical and hydraulic limitations by using Computational Fluid Dynamic (CFD) package. The mathematical model was validated with a laboratory model that had been conducted. The model of three intake pipes was investigated under five d

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Using Different Types of Projectiles to Make Avalanches to Avoid Human Being Disasters and Properties Destruction
...Show More Authors

Some geological phenomena as landslides and the mobilization of the accumulated rocks or soil are discussed in this research by using projectiles that cause mobility and falling of these land masses which are present at the top of mountains and edges of roads and streets to avoid accidents and human disasters which will occur if they are left falling by effect of climate or vibrating factors that are produced by performing dams, bridges and reservoirs. According to the different divisions of land masses groups, primary and secondary, which depend on type of movement and material arrangement that form the mobile masses, this research had shown the effect of projectiles for every type of cannons on the mobility of every groups of these rocks

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Economic Research
Credit derivatives: Do they matter to avoid credit exposure? (Some evidences from the US market)
...Show More Authors

Credit derivatives (CDs) have been increasingly acknowledged as an important requirement to hedge and transfer credit risk CR. Nonetheless, they have been extensively criticized for destabilizing the whole economic system bringing about the latest subprime credit crisis. The study’s main aim is to investigate the reason for the use of (CDs), whether it is used for hedging or trade purpose, for four of the US international financial institutions that had made it through the 2007 crisis to resume functioning post-crisis. This will be for three different and critical periods, namely the pre, during and after crisis periods (Q1, 2000-Q1, 2014). Adopting the SUR technique, the investigation of the factors that influence the net position of (CD

... Show More
Scopus (1)
Scopus
Publication Date
Tue Jun 01 2021
Journal Name
Iraqi Journal Of Physics
Studying Audio Capacity as Carrier of Secret Images in Steganographic System
...Show More Authors

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The instrumental support search strategies and avoid coping to psychological stressors and their relationship to the cognitive motivation of Al-Anbar University students.
...Show More Authors

the Current research aims to identify the psychological stressors coping strategies and their relationship to the cognitive motivation among Al-Anbar University students through the following hypotheses: 1) no statistically significant differences at a level (0.05) among the sample according to the instrumental support strategy depending on the variable type and specialization, 2) No statistically significant differences at a level (0.05) among the sample in regard of coping avoiding strategy depending on the variable type and specialization, 3) There is no statistically significant difference at a level (0.05) in cognitive motivation level among Al-Anbar University students, 4) No statistically significant differences at a level (0.05)

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Numerical scheme to Solve Boundary Value Problems Involving Singular Perturbation
...Show More Authors

The Wang-Ball polynomials operational matrices of the derivatives are used in this study to solve singular perturbed second-order differential equations (SPSODEs) with boundary conditions. Using the matrix of Wang-Ball polynomials, the main singular perturbation problem is converted into linear algebraic equation systems. The coefficients of the required approximate solution are obtained from the solution of this system. The residual correction approach was also used to improve an error, and the results were compared to other reported numerical methods. Several examples are used to illustrate both the reliability and usefulness of the Wang-Ball operational matrices. The Wang Ball approach has the ability to improve the outcomes by minimi

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Apr 06 2020
Journal Name
Bmc Oral Health
The reliability of surgeons to avoid traumatic insertion of dental implants into high-risk regions: a panoramic radiograph study
...Show More Authors
Abstract<sec> <title>Background

The posterior regions of the jaws usually represent a significant risk for implant surgery. A non-valid assessment of the available bone height may lead to either perforation of the maxillary sinus floor or encroachment of the inferior alveolar nerve and consequently to implant failure. This study aimed to evaluate the reliability of surgeon’s decision in appraising the appropriate implant length, in respect to vital anatomical structures, using panoramic radiographs.

Methods

Only implants that are inserted in relation to the maxillary sinus (MS) or the mandibular canal (MC) were enrolled

... Show More
View Publication
Crossref (6)
Crossref