Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More
XML is being incorporated into the foundation of E-business data applications. This paper addresses the problem of the freeform information that stored in any organization and how XML with using this new approach will make the operation of the search very efficient and time consuming. This paper introduces new solution and methodology that has been developed to capture and manage such unstructured freeform information (multi information) depending on the use of XML schema technologies, neural network idea and object oriented relational database, in order to provide a practical solution for efficiently management multi freeform information system.
The present research aims to know :
The level of Cognitive failures, information processing styles, and the problem-solving among the university students ,so it is aims to know the contribution of cognitive failures on the information processing styles and problem-solving, the research sample was (400) males and females student from the University of Wasit chosen randomly from both gender and for the study of the morning and evening .So these scales had been used as a research tool (failures cognitive scale ,the scale of information processing styles , and the scale of problem solving) , and by using the statistical m
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreAbstract
The issue of the protection of the environment is a shared responsibility between several destinations and sectors, and constitutes a main subject in which they can achieve sustainable development. In the sectors of government programs can be set up towards the establishment of the government sector to the green environment, so to be the implementati
... Show More
Codes of red, green, and blue data (RGB) extracted from a lab-fabricated colorimeter device were used to build a proposed classifier with the objective of classifying colors of objects based on defined categories of fundamental colors. Primary, secondary, and tertiary colors namely red, green, orange, yellow, pink, purple, blue, brown, grey, white, and black, were employed in machine learning (ML) by applying an artificial neural network (ANN) algorithm using Python. The classifier, which was based on the ANN algorithm, required a definition of the mentioned eleven colors in the form of RGB codes in order to acquire the capability of classification. The software's capacity to forecast the color of the code that belongs to an ob
... Show MoreThe development of a new, cheap, efficient, and ecofriendly adsorbents has become an important demand for the treatment of waste water, so nano silica is considered a good choice. A sample of nanosilica (NS) was prepared from sodium silicate as precursor and the nonionic surfactant Tween 20 as a template. The prepared sample was characterized using various characterization techniques such as FT-IR, AFM, SEM and EDX analysis. The spectrum of FTIR confirms the presence of silica in the sample, while SEM analysis of sample shows nanostructures with pore ranging (2-100nm).The adsorptive properties of this sample were studied by removing Congo red dye (CR) from aqueous solution. Batch experimental methods were carried o
... Show MoreIn this paper, a numerical model for fluid-structure interaction (FSI) analysis is developed for investigating the aeroelastic response of a single wind turbine blade. The Blade Element Momentum (BEM) theory was adopted to calculate the aerodynamic forces considering the effects of wind shear and tower shadow. The wind turbine blade was modeled as a rotating cantilever beam discretized using Finite Element Method (FEM) to analyze the deformation and vibration of the blade. The aeroelastic response of the blade was obtained by coupling these aerodynamic and structural models using a coupled BEM-FEM program written in MATLAB. The governing FSI equations of motion are iteratively calculated at each time step, through exchanging data between
... Show MoreDiscussed the research variables are important, privatization options and strategic analysis of the external environment, and that the purpose of the research is the trade-off between privatization options and choose the most appropriate alternative in proportion to the external environment, the research aims to determine the privatization the most appropriate option for companies and public contracting, showing the importance of the study provide the privatization of public companies as a strategy can all its way public sector organizations from the transfer of work practices or private sector organizations and mechanisms to it as contributing to improving the level of skills Develop the current and future level of performance,
... Show Moreان شركات التأمين وبسبب طبيعة نشاطها التأميني تتجمع لديها أموال ضخمة عن الأقساط التي تحصلها من المؤمن لهم, ولغرض عدم ترك هذه الاموال عاطلة, فأنه يتم استثمارها في مجالات وأدوات استثمار متنوعة لتحقيق عوائد منها. هذا ولغرض تحديد وتوجيه هذه الاموال في مجال أو أداة الاستثمار المناسبة أو تحديد مدى جدوى هذه الاستثمارات, فانه يتم تقييمها, وهناك عدة نماذج رياضية لتقييم بدائل الاستثمار في شركات التأمين, إلا أنه لا
... Show More