Preferred Language
Articles
/
bsj-7926
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
Journal Of Engineering
Seismic Vulnerability Assessment of Rizgary Hospital Building In Erbil City, the Capital City of KR of Iraq
...Show More Authors

Collapsing building structures during recent earthquakes, especially in Northern and Eastern Kurdistan, including the 2003 earthquake in Cewlig; the 2011 earthquake in Van; and the 2017 earthquake near Halabja province, has raised several concerns about the safety of pre-seismic code buildings and emergency facilities in Erbil city. The seismic vulnerability assessment of the hospital buildings as emergency facilities is one of the necessities which have a critical role in the recovery period following earthquakes. This research aims to study in detail and to extend the present knowledge about the seismic vulnerability of the Rizgary public hospital building in Erbil city, which was constructed before releasing the seism

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 06 2022
Journal Name
International Journal Of Professional Business Review
A Comparative Study to Reveal Earnings Management in Emerging Markets: Evidence from Tunisia and Iraq
...Show More Authors

Purpose: The purpose of the study is to compare and evaluate Earnings Management in Tunisia and Iraq.   Theoretical framework: Earnings Management is an important topic that has been studied by a significant number of researchers, as well as those who are interested in the accounting profession. Earnings Management has gotten a lot of attention from academics, professionals, and other interested parties in recent years (e.g. Kliestik et al., 2020; Rahman et al., 2021; Gamra &Ellouze, 2021)   Design/methodology/approach: The sample includes ten banks listed on the Bourse of Tunisia and Iraq Stock Exchanges for the year 2017. We have used a model of Kothari et al., (2005) as a tool to measure Earnings Management in both mark

... Show More
View Publication
Scopus (24)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
THE DYNAMICS OF A STAGE-STRUCTURE PREY-PREDATOR MODEL WITH HUNTING COOPERATION AND ANTI-PREDATOR BEHAVIOR
...Show More Authors

The mathematical construction of an ecological model with a prey-predator relationship was done. It presumed that the prey consisted of a stage structure of juveniles and adults. While the adult prey species had the power to fight off the predator, the predator, and juvenile prey worked together to hunt them. Additionally, the effect of the harvest was considered on the prey. All the solution’s properties were discussed. All potential equilibrium points' local stability was tested. The prerequisites for persistence were established. Global stability was investigated using Lyapunov methods. It was found that the system underwent a saddle-node bifurcation near the coexistence equilibrium point while exhibiting a transcritical bifurcation

... Show More
View Publication
Scopus (10)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
The ignorant poem and the body language: (The sieve of the Sikkhar sieve is a model)
...Show More Authors

This study is marked by: The ignorant poem and body language
 Its main objective is to reveal the manifestations of this language in the text mentioned, and accordingly, the sieve poem has been read semantic (semantic) and hermeneutic, revealing the poet's ability to employ symbols and signals (body language) in the poem chosen for this purpose; The existence of such language in pre-Islamic poetry. After a long reflection and reading, the signs and symbols of the physical movement of the body, and its feminine and aesthetic manifestations were identified, and this was achieved through the use of modern critical methodologies that directly affect this language. The study consisted of an introduction and three topics, followed by t

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Nuclear Physics A
Alpha-cluster preformation factor within cluster-formation model for odd-A and odd–odd heavy nuclei
...Show More Authors

View Publication
Scopus (52)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Structure Social Group Attachment measure
...Show More Authors

This study aims to answer the following question: Is a student who attaches to the social group strongly affected by social interaction and social status?  The population of the study included a group of medical students at the University of Al-Kufa. To collect the required data, a scale of Social Group Attachment consisting of (25) items was administered to a sample of (600) students, (257) male students, and (343) female students. The results revealed that students do not have a high level of attachment to the social group and they have a fear of that. There are no significant differences between the levels of attachment between males and females. There are no significant differences regarding colleges, the four academic levels, a

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
A Study of Person Deixis in J. M. Singe's Riders to the Sea
...Show More Authors

This study deals with an important area in the field of linguistics, namely person deixis.
The study aims at: (1) Describing the notion of deixis, its importance, and its place in the field
of linguistics, (2) Presenting a detailed illustration of person deixis, and (3) Conducting an
analysis of person deixis in one of Synge‟s plays Riders to The Sea according to Levinson‟s
model. The most important aim of these three is the third one (the analysis). To achieve this
aim, the researcher depends on Levinson‟s (1983) descriptive approach. According to the
descriptive approach of deixis, the category of person deixis can be defined as the encoding of
the participant roles in the speech situation. This encoding is r

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 23 2022
Journal Name
American Scientific Research Journal For Engineering, Technology, And Sciences
A Review of TCP Congestion Control Using Artificial Intelligence in 4G and 5G Networks
...Show More Authors

In recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne

... Show More
View Publication
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Modern Physics E
Hamiltonian sensitivity in calculating the electromagnetic moments and electroexcitation form factor for the <i>sd</i> nuclei using shell model with Skyrme–Hartree–Fock
...Show More Authors

In this work, the nuclear electromagnetic moments for the ground and low-lying excited states for sd shell nuclei have been calculated, resulting in a revised database with 56 magnetic dipole moments and 41 electric quadrupole moments. The shell model calculations are performed for each sd isotope chain, considering the sensitivity of changing the sd two-body effective interactions USDA, USDE, CWH and HBMUSD in the calculation of the one-body transition density matrix elements. The calculations incorporate the single-particle wave functions of the Skyrme interaction to generate a one-body potential in Hartree–Fock theory to calculate the single-particle matrix elements. For most sd shell nuclei, the experimental data are well rep

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref