Preferred Language
Articles
/
bsj-7926
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 15 2017
Journal Name
كلية بغداد للعلوم الاقتصادية الجامعة
Competitiveness of business organizations according to the role of knowledge management and customer orientation: a comparative survey study in Iraqi business organizations
...Show More Authors

The research aims to reach a set of objectives concerning creation a clear vision about conceptual, philosophical and practical dimension of relations, and effects between knowledge management, costumer orientation and competitiveness to construct a framework of a pragmatic model as a solution to research problem and its questions which the main one is about the role of knowledge management and costumer orientation in competitiveness of business organizations. To achieving this goal, it was necessary to make, in priory, a review and discussion to the theoretical dimension of research variables to have a clear vision about constructing hypostatical research model implying a set of hypotheses which, by proving them in companies studied, repr

... Show More
Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Analysis the Relationship between the Standards of Credit Assessment and Non-Performing Loans at the Gulf Commercial Bank
...Show More Authors

This paper aims to identify the approaches used in assessment the credit applications by Iraqi banks, as well as which approach is most used. It also attempted to link these approaches with reduction of credit default and banks’ efficiency particularly for the Gulf Commercial Bank. The paper found that the Gulf Bank widely relies on the method of Judgment Approach for assessment the credit applications in order to select the best of them with low risk of default. In addition, the paper found that the method of Judgment Approach was very important for the Gulf Bank and it driven in reduction the ratio of credit default as percentage of total credit. However, it is important to say that the adoption of statistical approaches for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 24 2017
Journal Name
Journal Of Engineering
A new analytic method to tune a fractional order PID controller
...Show More Authors

This paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a third order linear time

... Show More
Publication Date
Fri Nov 24 2017
Journal Name
Journal Of Engineering
A New Analytic Method to Tune a Fractional Order PID Controller
...Show More Authors

This paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a thir

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Change detection of remotely sensed image using NDVI subtractive and classification methods.
...Show More Authors

Change detection is a technology ascertaining the changes of
specific features within a certain time Interval. The use of remotely
sensed image to detect changes in land use and land cover is widely
preferred over other conventional survey techniques because this
method is very efficient for assessing the change or degrading trends
of a region. In this research two remotely sensed image of Baghdad
city gathered by landsat -7and landsat -8 ETM+ for two time period
2000 and 2014 have been used to detect the most important changes.
Registration and rectification the two original images are the first
preprocessing steps was applied in this paper. Change detection using
NDVI subtractive has been computed, subtrac

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Measurement of economic returns and environmental and social for green sector trade A prospective study in institutions of Basra to focus on the electricity sector
...Show More Authors

        Environmental risk growing Become challenge "and a matter of controversy and concern to many of those concerned with environment, social, economic, and the same happens with the administrative rather than in isolation for this movement, as the issues of climate change Disturbed and troubled him, especially after what caused the risk of destruction, and irresponsibility , chaos, and the futility of resources, crops, fields,  nature and homes and reactors, and after what happened in Japan from the scourge of "Hurricane tsunami " and earthquakes successive accompanied him and what became of him by surprise catastrophic affected the economy and the univ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 11 2021
Journal Name
Journal Of Kufa Studies Center
فتوى الجهاد الكفائي ودورها في بناء الإنسان (رؤية قرآنية معاصرة )
...Show More Authors

صار لزاماً علينا بيان مفهوم المعنى الحقيقي للجهاد وبيان أفضل أنواعه ورتبه وتحديداً الجهاد الكفائي بين النظرية والتطبيق من حيث معناه العام وبجوانبه الفكرية والاجتماعية , والسياسية ,والاقتصادية , وإيماناً منّا بانتفاضة المرجعية العليا في إعلانها الجهاد الكفائي ضد العصابات الارهابية التي استباحت الدين والوطن فكانت بالفعل الهام إلهي جسد أروع مبادئ الاسلام في التضحية والدفاع عن الدين ومقدساته , وانبل القيم الا

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The relationship between the central government and local administrations in the federal system: Experience the Iraqi model
...Show More Authors

   Increasingly, public organizations in the federal state are required to work together, as well as to work with others to achieve their objectives. In Iraq there are two levels of organizations, including federal and local, and these organizations have been forced to work for many years in an environment in which the responsibility for service delivery is shared between policy makers and service providers, and between local governments and the federal government. It is sometimes difficult to manage the relationship between these organizations (federal and local) and do not always provide the best possible outcome of this relationship. This paper reviews how to manage the relationship between local administrations and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 05 2007
Journal Name
Neural Network World
A canonical generic algorithm for likelihood estimator of first order moving average model parameter
...Show More Authors

The increasing availability of computing power in the past two decades has been use to develop new techniques for optimizing solution of estimation problem. Today's computational capacity and the widespread availability of computers have enabled development of new generation of intelligent computing techniques, such as our interest algorithm, this paper presents one of new class of stochastic search algorithm (known as Canonical Genetic' Algorithm ‘CGA’) for optimizing the maximum likelihood function strategy is composed of three main steps: recombination, mutation, and selection. The experimental design is based on simulating the CGA with different values of are compared with those of moment method. Based on MSE value obtained from bot

... Show More
Scopus (3)
Scopus