significant bits either in the spatial domain or frequency domain sequentially or pseudo
randomly through the cover media (Based on this fact) statistical Steganalysis use different
techniques to detect the hidden message, A proposed method is suggested of a stenographic
scheme a hidden message is embedded through the second least significant bits in the
frequency domain of the cover media to avoid detection of the hidden message through the
known statistical Steganalysis techniques.
This study identified intellectual and applied research in key variables (Strategic Control and Strategic Pitfalls) through internal dimensions then founded the (Federal Board of Supreme Audit) is the good area for analyzing the relationship and effect between variables by (125) questionnaire selected from (148) was distributed to the top and middle management as a seniors in controlling action. Appropriate methods, statistical tools, and programs were used to enhance the basic outputs, represented as a set of Conclusions and recommendations from the real control work with a specificity of potential Pitfalls in the effectiveness impact by Strategic Control in other dimensions which Studied.
WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg
... Show MoreFuzzy Based Clustering for Grayscale Image Steganalysis
Zubair oilfield is an efficient contributor to the total Iraqi produced hydrocarbon. Drilling vertical wells as well as deviated and horizontal wells have been experiencing intractable challenges. Investigation of well data showed that the wellbore instability issues were the major challenges to drill in Zubair oilfield. These experienced borehole instability problems are attributed to the increase in the nonproductive time (NPT). This study can assist in managing an investment-drilling plan with less nonproductive time and more efficient well designing.
To achieve the study objectives, a one dimension geomechanical model (1D MEM) was constructed based on open hole log measurements, including Gamma-
... Show MoreSome geological phenomena as landslides and the mobilization of the accumulated rocks or soil are discussed in this research by using projectiles that cause mobility and falling of these land masses which are present at the top of mountains and edges of roads and streets to avoid accidents and human disasters which will occur if they are left falling by effect of climate or vibrating factors that are produced by performing dams, bridges and reservoirs. According to the different divisions of land masses groups, primary and secondary, which depend on type of movement and material arrangement that form the mobile masses, this research had shown the effect of projectiles for every type of cannons on the mobility of every groups of these rocks
... Show MoreThe pumping station became widely used in many fields. Free surface vortices at intakes of pumps are not favorable. It may cause noise, excessive vibration, damage to the pumping structure, reduction in efficiency and flow for hydro-turbines, etc. One of the important problems encountered during the pump intake design is the depth of submergence and other design parameters to avoid strong free-surface vortices formation. This study aims to compute the critical submergence depth with some geometrical and hydraulic limitations by using Computational Fluid Dynamic (CFD) package. The mathematical model was validated with a laboratory model that had been conducted. The model of three intake pipes was investigated under five d
... Show MoreA new method presented in this work to detect the existence of hidden
data as a secret message in images. This method must be applyied only on images which have the same visible properties (similar in perspective) where the human eyes cannot detect the difference between them.
This method is based on Image Quality Metrics (Structural Contents
Metric), which means the comparison between the original images and stego images, and determines the size ofthe hidden data. We applied the method to four different images, we detect by this method the hidden data and find exactly the same size of the hidden data.
Credit derivatives (CDs) have been increasingly acknowledged as an important requirement to hedge and transfer credit risk CR. Nonetheless, they have been extensively criticized for destabilizing the whole economic system bringing about the latest subprime credit crisis. The study’s main aim is to investigate the reason for the use of (CDs), whether it is used for hedging or trade purpose, for four of the US international financial institutions that had made it through the 2007 crisis to resume functioning post-crisis. This will be for three different and critical periods, namely the pre, during and after crisis periods (Q1, 2000-Q1, 2014). Adopting the SUR technique, the investigation of the factors that influence the net position of (CD
... Show MoreSteganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect
... Show MoreThe aim of this paper is to study the convergence of an iteration scheme for multi-valued mappings which defined on a subset of a complete convex real modular. There are two main results, in the first result, we show that the convergence with respect to a multi-valued contraction mapping to a fixed point. And, in the second result, we deal with two different schemes for two multivalued mappings (one of them is a contraction and other has a fixed point) and then we show that the limit point of these two schemes is the same. Moreover, this limit will be the common fixed point the two mappings.