Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreIn this paper we give definitions, properties and examples of the notion of type Ntopological space. Throughout this paper N is a finite positive number, N 2. The task of this paper is to study and investigate some properties of such spaces with the existence of a relation between this space and artificial Neural Networks (ïNN'S), that is we applied the definition of this space in computer field and specially in parallel processing
In this paper the use of a circular array antenna with adaptive system in conjunction with modified Linearly Constrained Minimum Variance Beam forming (LCMVB) algorithm is proposed to meet the requirement of Angle of Arrival (AOA) estimation in 2-D as well as the Signal to Noise Ratio (SNR) of estimated sources (Three Dimensional 3-D estimation), rather than interference cancelation as it is used for. The proposed system was simulated, tested and compared with the modified Multiple Signal Classification (MUSIC) technique for 2-D estimation. The results show the system has exhibited astonishing results for simultaneously estimating 3-D parameters with accuracy approximately equivalent to the MUSIC technique (for estimating elevation and a
... Show MoreFuture wireless communication systems must be able to accommodate a large number of users and simultaneously to provide the high data rates at the required quality of service. In this paper a method is proposed to perform the N-Discrete Hartley Transform (N-DHT) mapper, which are equivalent to 4-Quadrature Amplitude Modulation (QAM), 16-QAM, 64-QAM, 256-QAM, … etc. in spectral efficiency. The N-DHT mapper is chosen in the Multi Carrier Code Division Multiple Access (MC-CDMA) structure to serve as a data mapper instead of the conventional data mapping techniques like QPSK and QAM schemes. The proposed system is simulated using MATLAB and compared with conventional MC-CDMA for Additive White Gaussian Noise, flat, and multi-path selective fa
... Show MorePharmaceutical-instigated pollution is a major concern, especially in relation to aquatic environments and drugs such as meropenem antibiotics. Adsorbents, such as multi-walled carbon nanotubes, offer potential as means of removing polluting meropenem antibiotics and other similar compounds from water. In order to evaluate the effectiveness of multi-walled carbon nanotubes in this capacity, various experimental parameters, including contact time, initial concentration, pH, temperature and the dose of adsorbent have been investigated. The Langmuir and the Freundlich isotherm models have been used. The data obtained using a modified Langmuir model have been consistent with the experimental ones; the best pH value has been obtained to have the
... Show MoreThe exploitation of all available resources and benefiting from them is one of the most important problems facing the decision makers at the present time. In order to exploit these resources, it is necessary to organize the conflicting objectives, which is the main work in the project management, which enables the development of a plan that decision makers can use to shorten the total completion time and reduce the total cost of the project. Through the use of modern scientific techniques, and therefore the researcher using the critical path method using the technology of programming goals to find more efficient ways to make appropriate decisions where the researcher worked to solve the problems in the construction of the Departm
... Show MoreThis search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as com
... Show MoreFar infrared photoconductive detectors based on multi-wall carbon nanotubes (MWCNTs) were fabricated and their characteristics were tested. MWCNTs films deposited on porous silicon (PSi) nanosurface by dip and drop coating techniques. Two types of deposited methods were used; dip coating sand drop –by-drop methods. As well as two types of detector were fabricated one with aluminum mask and the other without, and their figures of merits were studied. The detectors were illuminated by 2.2 and 2.5 Watt from CO2 of 10.6 m and tested. The surface morphology for the films is studied using AFM and SEM micrographs. The films show homogeneous distributed for CNTs on the PSi layer. The root mean square (r.m.s.) of the films surface roughness in
... Show MoreThis search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as
... Show MoreThe love of the world and its lusts are the head of sins and the corruptors of religion, and the one who loves and loves them who prefers them over the hereafter is one of the most pitiful of creation, and the least intelligent of them, as he prefers imagination over reality, sleep over wakefulness, fleeting shadow over eternal bliss and the mortal abode over the eternal abode, and he sold the life of eternity for the most luxurious life. In life, it is dreams and sleep or as a fleeting shadow, and as it was said: The intelligent person is not deceived.
The reason for choosing this topic is due to two things:
The first: When I contemplated the reasons for the differences and conflicts that afflicted our wounded and occupied country