Preferred Language
Articles
/
oxdAFY4BVTCNdQwCyzER
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Signal to Noise Ratio is about 55dB. The recovered secret image is extracted (100%) if stego-image has no attack. These methods can provide good hiding capacity and image quality. Several types of attacks have been applied to the proposed methods in order to measure the robustness like (compression, add noise and cropping). The proposed algorithm has been implemented by using computer simulation program MATLAB version 7.9 under windows 7 operating system by Microsoft cooperation.

Publication Date
Fri Feb 01 2019
Journal Name
Journal Of The College Of Education For Women
The Video effect on Youths Value
...Show More Authors

The Video effect on Youths Value

View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Fast discrimination of fake video manipulation
...Show More Authors

<span>Deepfakes have become possible using artificial intelligence techniques, replacing one person’s face with another person’s face (primarily a public figure), making the latter do or say things he would not have done. Therefore, contributing to a solution for video credibility has become a critical goal that we will address in this paper. Our work exploits the visible artifacts (blur inconsistencies) which are generated by the manipulation process. We analyze focus quality and its ability to detect these artifacts. Focus measure operators in this paper include image Laplacian and image gradient groups, which are very fast to compute and do not need a large dataset for training. The results showed that i) the Laplacian

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Sat Dec 15 2018
Journal Name
Journal Of The College Of Education For Women
Future Visions and its Relationship with Illegal Immigration among Next to Graduation Students
...Show More Authors

The current study was concerned to address these gaps in literature by identifying: first level and type of future visions among the next graduation student, second level and type of future visions among the sample according to gender (Male- Female), third level of the illegal immigration among the sample, fourth level of the illegal immigration according to gender (Male, Female), and finally the relationship between future visions and illegal immigration. To achieve the aims of the current study, the researchers created a questionnaire for the future visions. The psychometric properties (e.g. face validity, structure validity, and reliability) were tested. Base on the current sample, results showed that the questionnaire had sound psych

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Medium access control protocol design for wireless communications and networks review
...Show More Authors

<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe

... Show More
Crossref (1)
Crossref
Publication Date
Sun Apr 06 2014
Journal Name
Journal Of Educational And Psychological Researches
The reality of child labor in Baghdad ... And access to treatment
...Show More Authors

  The phenomenon of child labor, any activity performed by a child and represents a contribution to the production, this phenomenon had been rife in Iraqi society, after that the proportion of child labor for the age group (6-14 years) amounting to 3% in 2006, became for  the same age group of 8% in 2008*.                                                      

It is recognized that each phenomenon reasons, the phenomenon which our atten

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 06 2001
Journal Name
مجلة العلوم الاقتصادية والادارية
Double cross-over and cross-over with extra period designs -comparative study-
...Show More Authors

The goal of the research is to find the optimization in the test of the appropriate cross-over design for the experiment that the researcher is carrying out (under assumption that there are carry-over effects of the treatments) to posterior periods after the application period (which is often assumed to be the first period). The comparison between the double cross-over design and the cross-over design with extra period. The similarities and differences between the two designs were studied by measuring the Relative Efficiency (RE) of the experiment.

Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research &amp; Development
Comparison of the Cyclic Fatigue of Protaper Next, 2Shape and Hyflex EDM Using Glyde
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Conference Proceedings Of The Society For Experimental Mechanics Series
A comparative study of mode decomposition to relate next-ERA, PCA, and ICA modes
...Show More Authors

This paper discusses a comparative study to relate parametric and non-parametric mode decomposition algorithms for response-only data. Three popular mode decomposition algorithms are included in this study: the Eigensystem Realization Algorithm with the Natural Excitation Technique (NExT-ERA) for the parametric algorithm, as well as the Principal Component Analysis (PCA) and the Independent Component Analysis (ICA) for the non-parametric algorithms. A comprehensive parametric study is provided for (i) different response types, (ii) excitation types, (iii) system damping, and (iv) sensor spatial resolution to compare the mode shapes and modal coordinates of using a 10-DOF building model. The mode decomposition results are also compared using

... Show More
Scopus (1)
Scopus
Publication Date
Mon Apr 03 2023
Journal Name
Aro-the Scientific Journal Of Koya University
The Most Common Characteristics of Fragile Video Watermarking
...Show More Authors

The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject shou

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Oct 30 2018
Journal Name
Companion Of The 2018 Acm Conference On Computer Supported Cooperative Work And Social Computing
Collaborative Content Creation
...Show More Authors

Modern education incorporates strong elements of collaborative learning: activities that prompt students to collaborate on completing learning tasks. In this work we investigate the relationship between media type and student collaboration and attribution patterns during collaborative content creation. We run similarity analyses on text and video artifacts submitted by students as part of collaborative exercises in an undergraduate module. Our main finding is that the same cohort of students was significantly more likely to attribute non-original content to its sources when authoring text compared to video content and when this content is not produced by a peer student. Our preliminary results based on only two media suggest that media type

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref