Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights. The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.
The goal (purpose) from using development technology that require mathematical procedure related with high Quality & sufficiency of solving complex problem called Dynamic Programming with in recursive method (forward & backward) through finding series of associated decisions for reliability function of Pareto distribution estimator by using two approach Maximum likelihood & moment .to conclude optimal policy
Churning of employees from organizations is a serious problem. Turnover or churn of employees within an organization needs to be solved since it has negative impact on the organization. Manual detection of employee churn is quite difficult, so machine learning (ML) algorithms have been frequently used for employee churn detection as well as employee categorization according to turnover. Using Machine learning, only one study looks into the categorization of employees up to date. A novel multi-criterion decision-making approach (MCDM) coupled with DE-PARETO principle has been proposed to categorize employees. This is referred to as SNEC scheme. An AHP-TOPSIS DE-PARETO PRINCIPLE model (AHPTOPDE) has been designed that uses 2-stage MCDM s
... Show MoreSeveral studies have indicated an unprecedented increase in the number of Arab youth who watch music videos. It is also a custom in Arab countries to broadcast songs at their happy parties such as weddings, engagements and birthdays. We see that guests and party owners interact by dancing and singing with the songs, while the viewership rates of Arab music videos have reached millions on YouTube. The researcher decided to study the image of women through the lyrics of these songs, due to their importance in shaping the image of women in the minds of young people and shaping the (self-image) of young women. Twenty songs were selected from the most watched songs on YouTube for the year 2024, and it was found that the negative qualities of t
... Show Moreتعتبر المعادلات التفاضلية الموجية من اهم المواضيع التي تمثل على سبيل المثال الحركة الموجية للاهتزازات الأرضية . ومن هنا فان ايجاد حلول تقريبيه لمثل هذه المعادلات بدقة وسرعه عالية وبشكل اسرع من الحلول التحليلية والمعقدة , اصبح ممكنا من خلال استخدام الذكاء الاصطناعي واساليب التعلم الالي. في هذا البحث هناك ثلاثة أهداف الأول هو تحويل مشكلة القيمة الأولية للمعادلة الموجية إلى شكلها القانوني وإيجاد حلها ا
... Show MoreWastewater projects are one of the most important infrastructure projects, which require developing strategic plans to manage these projects. Most of the wastewater projects in Iraq don’t have a maintenance plan. This research aims to prepare the maintenance management plan (MMP) for wastewater projects. The objective of the research is to predict the cost and time of maintenance projects by building a model using ANN. The research sample included (15) completed projects in Wasit Governorate, where the researcher was able to obtain the data of these projects through the historical information of the Wasit Sewage Directorate. In this research artificial neural networks (ANN) technique was used to build two models (cost
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreIn this paper a dynamic behavior and control of a jacketed continuous stirred tank reactor (CSTR) is developed using different control strategies, conventional feedback control (PI and PID), and neural network (NARMA-L2, and NN Predictive) control. The dynamic model for CSTR process is described by a first order lag system with dead time.
The optimum tuning of control parameters are found by two different methods; Frequency Analysis Curve method (Bode diagram) and Process Reaction Curve using the mean of Square Error (MSE) method. It is found that the Process Reaction Curve method is better than the Frequency Analysis Curve method and PID feedback controller is better than PI feedback controller.
The results s
... Show MoreA simple, rapid spectrophotometric method has been established for the determination of chlorpromazine hydrochloride (CPZ) in its pure form and in a tablet formulations. The suggested method is based on the oxidative coupling reaction with4-nitroainlline using KIO3 in acidic solution to produce a violet colored product with maximum absorption at λ=526 nm.The analytical data obtained throughout this study could be summarid as follows: 1ml of 1M HCl (pH=2.2), 1 ml of 4-nitroanilline (1x10-2M), and 1.5ml of (1x10-2)KIO3 per 25 ml reaction medium. The order of a
... Show More