Preferred Language
Articles
/
KReiL48BVTCNdQwCMV4K
Increase the Capacity Amount of Data Hiding to Least Significant BIT Method
...Show More Authors

Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients
...Show More Authors

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 13 2022
Journal Name
Lecture Notes In Networks And Systems
Single-Bit Architecture for Low Power IoT Applications
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Engineering
Bit Record Analysis for Bits Evaluating and Selection
...Show More Authors

The bit record is a part from the daily drilling report which is contain information about the type and the number of the bit that is used to drill the well, also contain data about  the used weight on bit  WOB ,revolution per minute RPM , rate of penetration ROP, pump pressure ,footage drilled and bit dull grade. Generally we can say that the bit record is a rich brief about the bit life in the hole. The main purpose of this research is to select the suitable bit to drill the next oil wells because the right bit selection avoid us more than one problems, on the other hand, the wrong bit selection cause more than one problem. Many methods are related to bit selection, this research is familiar with four of thos

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of weighted estimated method and proposed method (BEMW) for estimation of semi-parametric model under incomplete data
...Show More Authors

Generally, statistical methods are used in various fields of science, especially in the research field, in which Statistical analysis is carried out by adopting several techniques, according to the nature of the study and its objectives. One of these techniques is building statistical models, which is done through regression models. This technique is considered one of the most important statistical methods for studying the relationship between a dependent variable, also called (the response variable) and the other variables, called covariate variables. This research describes the estimation of the partial linear regression model, as well as the estimation of the “missing at random” values (MAR). Regarding the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Business Risk Assessment Using Client Strategy Analysis Approach in order to Increase the Efficiency and Effectiveness of the Audit Process
...Show More Authors

Abstract

This study aimed to identify the business risks using the approach of the client strategy analysis in order to improve the efficiency and effectiveness of the audit process. A study of business risks and their impact on the efficiency and effectiveness of the audit process has been performed to establish a cognitive framework of the main objective of this study, in which the descriptive analytical method has been adopted. A survey questionnaire has been developed and distributed to the targeted group of audit firms which have profession license from the Auditors Association in the Gaza Strip (63 offices). A hundred questionnaires have been distributed to the study sample of which, a total of 84 where answered and

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
Significant Safety Factors Affecting the Safety Performance in Iraqi Construction Projects
...Show More Authors

Despite recent attempts to improve safety in the construction sector, this sector is considered dangerous and unsafe. Iraq is one of the emerging nations that suffers from a lack of construction safety management. In 2018, the construction sector in Iraq was responsible for 38% of all industrial accidents. Creating a safety program minimizes this problem by making safety an intrinsic part of construction projects. As a result, this article aims to identify the crucial safety factors that affect the safety performance in Iraqi construction projects. After conducting a critical literature review of the related literature, a list of 35 sub-factors classified into nine categories of main factors was chosen to rank each facto

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The role of administrative supervision scope and the single window to increase the efficiency of investment (Case study: Sudanese Ministry of Investment)
...Show More Authors

Investment drives the wheel of the development of different developed and developing countries. Sudan is a model for a developing country facing a lot of difficulties in the field of both local and foreign investment. The present study was focused on the problem of poor diversification and efficiency of both local and foreign investment in Sudan. Also, it clarified the important role of administrative supervision to strengthen the efficiency of investment, taking the experience of the Sudan as a model. The researchers used the well-known descriptive and analytical tools (questionnaire, interview, observation) to complete this study. A well designed questionnaire was used. It included all questions that could cover all aspects of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 27 2022
Journal Name
Journal Of Positive School Psychology .
The Explosive Capacity Of The Muscles Of The Two Men And Their Relationship To The Scoring Of Football Halls
...Show More Authors

The research dealt with its forefront a definition of the aspects of the study and its variables, the explosive capacity and its relationship to the scoring of football for the halls and highlights the importance of these variables, and the problem of the research consisted that some players fail to score Amie because of the weak power of shots or the slow scoring, so the researchers saw studying this problem and knowing the extent of the influence of the explosive strength During the performance of the skill of scoring with five football, the study aimed to identify the relationship between the explosive strength and the skill of scoring with five football. Researchers assume that there is a statistically significant relationship between t

... Show More
View Publication Preview PDF