Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
Preserving the Past and Building the Future: A Sustainable Urban Plan for Mosul, Iraq
It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL). This HDL program is then used to configure an FPGA to implement the designed circuit.
The plant licorice is considered important plants as nutritionally and medically and economically, as a rich in phytochemical, vitamins and minerals, and being widely available, Research indicated the presence of many nutrients such as (proteins, Carbohydrates, vitamins and minerals) as well as presence of Glycyrrhizin which responsible of sweet taste, that allowing the possibility to use it as natural intensity sweetener with few calories in Sweetening of many food. This research is aimed to study the Stability of Glycyrrhizin toward the various manufacturing conditions such as (thermal treatment, pH of foods and microwaves), so three factorial experiments was implemented to find out the Stability as following: 100C° - 121C° - Microwa
... Show MoreCentral and Eastern European Online Library - CEE journals, documents, articles, periodicals, books available online for download, Zeitschrfitendatenbank, Online Zeitschriften, Online Zeitschriftendatenbank
The study aims at investigating the quality of internal auditing and its impact on nature, timing, and procedures of external audit, based on international auditing standards, in particular ISA (610). The standard ISA (610) requires the external auditors to assess independence, the scope of internal audit unit, competence, and due professional care of internal auditors as indicators that reflect the quality of internal audit performance before deciding to rely on internal auditors.
The sample of this study consisted of external auditors in Iraqi Solidary Companies for Auditing. A questionnaire was distributed to them via e-mail
... Show MoreWastewater recycling for non-potable uses has gained significant attention to mitigate the high pressure on freshwater resources. This requires using a sustainable technique to treat natural municipal wastewater as an alternative to conventional methods, especially in arid and semi-arid rural areas. One of the promising techniques applied to satisfy the objective of wastewater reuse is the constructed wetlands (CWs) which have been used extensively in most countries worldwide through the last decades. The present study introduces a significant review of the definition, classification, and components of CWs, identifying the mechanisms controlling the removal process within such units. Vertical, horizontal, and hybrid CWs
... Show More