significant bits either in the spatial domain or frequency domain sequentially or pseudo
randomly through the cover media (Based on this fact) statistical Steganalysis use different
techniques to detect the hidden message, A proposed method is suggested of a stenographic
scheme a hidden message is embedded through the second least significant bits in the
frequency domain of the cover media to avoid detection of the hidden message through the
known statistical Steganalysis techniques.
In this research was the study of a single method of estimation and testing parameters mediating variables (Mediation) in a specimen structural equations SEM a bootstrap method, for the purpose of application of the integrated survey of the situation Marital data and health mirror Iraqi (I-WISH) for the year 2011 from the Ministry of Planning - device Central Bureau of Statistics, and applied to the appropriate data from the terms of the data to a form of structural equation SEM using factor analysis affirmative (Confirmatory Factor analysis) CFA As a way to see the match variables that make up the model, and after confirming the model matching or suitability are having the effect of variables mediation in the model tested by the
... Show Moreأن الطرق اللامعلمية هي نوع من الطرق الاحصائية الاستدلالية التي يمكن استخدامها للتوصل إلى أستنتاجات لذا كان حرص المؤلف على أصدار هذا الكتاب والذي يعمل على توضيح ( لماذا ؟ ومتى ؟ وكيف ؟ ) تستخدم كل طريقة إحصائية . وبإمكان القاريء سواء أكان أستاذا ً جامعيا ً أو باحثا ً أو طالبا ً في الدراسات العليا ( الماجستير والدكتوراه ) أو طالبا ً في الدراسات الأولية أن يتتبع جميع الخطوات لحساب كل قانون إحصائي وبدءا ً من عملية إدخ
... Show MoreText based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.
... Show MoreThe internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat
... Show MoreThe main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola
... Show MoreBig data usually running in large-scale and centralized key management systems. However, the centralized key management systems are increasing the problems such as single point of failure, exchanging a secret key over insecure channels, third-party query, and key escrow problem. To avoid these problems, we propose an improved certificate-based encryption scheme that ensures data confidentiality by combining symmetric and asymmetric cryptography schemes. The combination can be implemented by using the Advanced Encryption Standard (AES) and Elliptic Curve Diffie-Hellman (ECDH). The proposed scheme is an enhanced version of the Certificate-Based Encryption (CBE) scheme and preserves all its advantages. However
... Show MoreThe internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat
... Show MoreThis paper experimentally investigates the heating process of a hot water supply using a neural network implementation of a self-tuning PID controller on a microcontroller system. The Particle Swarm Optimization (PSO) algorithm employed in system tuning proved very effective, as it is simple and fast optimization algorithm. The PSO method for the PID parameters is executed on the Matlab platform in order to put these parameters in the real-time digital PID controller, which was experimented with in a pilot study on a microcontroller platform. Instead of the traditional phase angle power control (PAPC) method, the Cycle by Cycle Power Control (CBCPC) method is implemented because it yields better power factor and eliminates harmonics
... Show More
Public relations are amongst the social sciences that rely on scientific methods in achieving new knowledge or resolving existing problems by means of its scientific researches that are often applied and require a classification in terms of their results’ analysis. It also requires subtle statistical processes whether in constructing their material or in analyzing and interpreting their results.
This research seeks to identify the relation between public relations and statistics, and the significance a researcher or practitioner in the domain of public relations should assign to statistics being one of the important criteria in identifying the accuracy and object
... Show More