In this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.
Abstract:
In light of the development in the banking environment and the increasing reliance on electronic systems in providing banking services and due to the intense competition witnessed by the banking sector, the need has emerged to apply the comprehensive electronic banking system, which works on the Internet in providing new and diverse banking services regardless of time and place by linking all branches to one central database, and despite the advantages achieved from the application of the comprehensive system, there is a set of risks that accompany the use of that system, What requires the auditors to develop the audit method in line with the size of the development in the
... Show MoreThe current research dealt with contrastive structures and the culture of reception in the design of interior spaces as embodying a rhetorical aspect that reveals formal values related to the meanings of beauty through the mechanisms of symbolism and interpretation that drives mental behavior and is in harmony with intellectual data and its performance function.
Hence, the research in the first chapter dealt with the research problem, the need for it, and the extent of the necessity that calls for studying contrastive structures in interior design and architecture, and touching and searching for what is the paradox and its representations for the recipient, in which the interior designer plays an active role in presenting the best cre
The ongoing research to improve the clinical outcome of titanium implants has resulted in the implementation of multiple approaches to deliver osteogenic growth factors accelerating and sustaining osseointegration. Here we show the presentation of human bone morphogenetic protein 7 (BMP-7) adsorbed to titanium discs coated with poly(ethyl acrylate) (PEA). We have previously shown that PEA promotes fibronectin organization into nanonetworks exposing integrin- and growth-factor-binding domains, allowing a synergistic interaction at the integrin/growth factor receptor level. Here, titanium discs were coated with PEA and fibronectin and then decorated with ng/mL doses of BMP-7. Human mesenchymal stem cells were used to investigate cellular resp
... Show MoreInvestment in Human is one of the best and most important investments as it is renewed and developed resource over time in comparison with depleted material resources. Human resources is considered the part of the population that could be employed economically to contribute in increasing production energies as it is the support pillar of the society and have great energies that construct the society and raise of nations as well as he is distinguished with characteristics of ambitions to freedom.
Iraq is one of the countries that has large number of population in age of work and production and reduce in age dependent classes (children and old people).This dynamic in population led to step
... Show MoreHuman Resources Management Practices (HRMP) and managerial control represent two academic fields that have been and still are the focus of many studies. However, merging both fields and studying the relationship that connects them and also the role that HRMP play in achieving the requirements of managerial control represents a new and novel study according to the available literature in these fields.
To achieve these goals, this study has been conducted, using the surveying questionnaire method, on a sample of ten general inspector offices in Iraq that work in the field of control for ministries and independent committees. A questionnaire has been used to collect the data which was analyzed with several s
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreProsthetic is an artificial tool that replaces a member of the human frame that is absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients. This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n
... Show MoreVaried uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r
... Show More