The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current techniques have not been successful in attaining more improved security caused by the non-encrypted data that only underwent the first layer of concealment through merely a straightforward embedment process of the secret data within the images, thus allowing the extraction of the concealed data to be quite simple for hostile entities. Hence, in the current study, the proposed scheme, we have improved the Bit Inverting Map method to narrow the gap of existing work. Our experimental results indicate that the proposed framework maintains a better balance between image visual quality and security, with relatively less computational and complexity, which assures its effectiveness compared to other state-of-the-art methods.
Purpose: To identify the size of the food gap for the main agricultural products and crops in Iraq, which reflects to us the extent to which agricultural production in particular and the agricultural sector in general have declined.Theoretical framework: The theoretical side of the research dealt with the definition of self-sufficiency and the food gap, as well as identifying the reality of agricultural production in Iraq during the study period, as well as the reality of the food gap for the most important agricultural, plant and animal products.Design/methodology/approach: In reviewing the research problem, the researcher adopted the method of deductive and descriptive analysis based on the presentation and detail of official data
... Show MoreThe research aimed to identify the level of job security, the level of sports institutional performance, and the relationship, contribution and impact of job security to sports institutional performance from the point of view of workers in the Iraqi Ministry of Youth and Sports. The descriptive approach was adopted in the manner of correlational relationships on a sample of (400) individuals who were randomly selected by (33.333%) of the employees working in the institutions at the headquarters of the Ministry of Youth and Sports, amounting to a total of (2293) individuals for the sports season (2022-2023), and they are naturally distributed among (13) main institutions in the formations of the headquarters of this ministry, and after adopt
... Show MoreMost countries in the world particularly developing countries, including Iraq, facing extremely dangerous problem with social and political dimensions, which is the emergence of the food crisis problem ,the decrease in domestic food production in Iraq isn't meet the needs of its population food, due to the fact that the agricultural sector suffers from multiple natural ,economic and human problems .It is still below the level required to meet the needs of the population of food ,since food at the forefront of priorities needed by the human . This represents indispensable basic necessity , so the responsibility of its availability permanently in appropriate&nb
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreIn this paper, we use the definition of the action on the set of semi-group of the structure of this research .We introduce the concepts of -system which is a triple , , such that is a Hausdorff compact space called phase space, is a semi-group of transformations with a continuous action of on . We study and proof some theoretical properties related with that system. We also introduce the concept of Enfolding semi-group ( , ,and we prove that it is a compact right topological semi-group. In addition, we study the left and right ideals in the Enfolding semi-group. By using the dynamical system, we reflect various properties concerning with its structure for the Enfolding semi-group. Furthermore, we describe
... Show Moresensor sampling rate (SSR) may be an effective and crucial field in networked control systems. Changing sensor sampling period after designing the networked control system is a critical matter for the stability of the system. In this article, a wireless networked control system with multi-rate sensor sampling is proposed to control the temperature of a multi-zone greenhouse. Here, a behavior based Mamdany fuzzy system is used in three approaches, first is to design the fuzzy temperature controller, second is to design a fuzzy gain selector and third is to design a fuzzy error handler. The main approach of the control system design is to control the input gain of the fuzzy temperature controller depending on the cur
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreSingapore has invested its human resources for the development of the country since earlier times, so it has directed attention to the education sector. Education and development complement each other, as investment in education has contributed over several years to the development of Singapore economy and has made it one of the strongest economies in Asia and the world. Despite the obstacles that faced educational policies in Singapore, the presence of a wise leadership capable of overcoming difficulties and solving them, and providing the appropriate atmosphere for the development of education has contributed significantly to making it one of the most advanced educational systems in the world, and making this system the main pillar for
... Show MoreThis investigation is a study of the length of time where drops can exist at an oil-water interface before coalescence take place with a bulk of the same phase as the drops. Many factors affecting the time of coalescence were studied in is investigation which included: dispersed phase flow rate, continuous phase height, hole size in distributor, density difference between phases, and viscosity ratio of oil/water systems, employing three liquid/liquid systems; kerosene/water, gasoil/water, and hexane/water. Higher value of coalescence time was 8.26 s at 0.7ml/ s flow rate, 30cm height and 7mm diameter of hole for gas oil/water system, and lower value was 0.5s at 0.3ml/s flow rate, 10 cm height and 3mm diameter of hole for hexane
... Show MoreFor many years, the construction industry damages have been overlooked such as unreasonable consumption of resources in addition to producing a lot of construction waste but with global awareness growth towards the sustainable development issues, the sustainable construction practices have been adopted, taking into account the environment and human safety. The research aims to propose a management system for construction practices which could be adopted during constructing different types of sustainable buildings besides formulating flowcharts which clarify the required whole phases of sustainable buildings life cycle. The research includes two parts: theoretical part which generally ,handles the sustainability concepts at construction i
... Show More