Preferred Language
Articles
/
bsj-7926
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 12 2021
Journal Name
Innovative Infrastructure Solutions
Facilitating claims settlement using building information modeling in the school building projects
...Show More Authors

View Publication
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sat Jul 18 2020
Journal Name
College Of Islamic Sciences
The fundamentalist and news theory between the modernity and excessive modernization of the foreground
...Show More Authors

Conclusion :

The conflict between the fundamentalist and news theory in the methodology that each of the two schools pursued with the Twelver Shi'a Imamiyyah in deriving the legal rulings from the sources of legislation, especially in the second source, which is the noble hadith and narration after the Holy Qur’an, which is the first source has gone through multiple and complex stages that led This struggle to excess, stress, exaggeration, negligence, neglect and indulgence by each of the two schools in dealing with the noble hadith and narration and in the manufacture of rules and laws and fundamentalist and juristic theories of the process of jurisprudential development of legal rulings where every school believed and proceed

... Show More
View Publication Preview PDF
Publication Date
Fri May 01 2020
Journal Name
Journal Of Engineering
Building 1D Mechanical Earth Model for Zubair Oilfield in Iraq
...Show More Authors

Many problems were encountered during the drilling operations in Zubair oilfield. Stuckpipe, wellbore instability, breakouts and washouts, which increased the critical limits problems, were observed in many wells in this field, therefore an extra non-productive time added to the total drilling time, which will lead to an extra cost spent. A 1D Mechanical Earth Model (1D MEM) was built to suggest many solutions to such types of problems. An overpressured zone is noticed and an alternative mud weigh window is predicted depending on the results of the 1D MEM. Results of this study are diagnosed and wellbore instability problems are predicted in an efficient way using the 1D MEM. Suitable alternative solutions are presented

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Blind Color Image Steganography in Spatial Domain
...Show More Authors

WA Shukur, FA Abdullatif, Ibn Al-Haitham Journal For Pure and Applied Sciences, 2011 With wide spread of internet, and increase the price of information, steganography become very important to communication. Over many years used different types of digital cover to hide information as a cover channel, image from important digital cover used in steganography because widely use in internet without suspicious.

View Publication
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Efficiency Measurement Model for Postgraduate Programs and Undergraduate Programs by Using Data Envelopment Analysis
...Show More Authors

Measuring the efficiency of postgraduate and undergraduate programs is one of the essential elements in educational process. In this study, colleges of Baghdad University and data for the academic year (2011-2012) have been chosen to measure the relative efficiencies of postgraduate and undergraduate programs in terms of their inputs and outputs. A relevant method to conduct the analysis of this data is Data Envelopment Analysis (DEA). The effect of academic staff to the number of enrolled and alumni students to the postgraduate and undergraduate programs are the main focus of the study.

 

View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Annales Pharmaceutiques Françaises
Adopting video assignments as a tool to improve first-year pharmacy students class engagement
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Iraqi Journal Of Physics
Preparation of polyaniline polymer and using it as a Vapor sensor of acids
...Show More Authors

 Polyaniline organic Semiconductor polymer was prepared by oxidation polymerization by adding hydrochloric acid concentration of 0.1M and potassium per sulfate concentration of 0.2M to 0.1M of aniline at room temperature, the polymer was deposited at glass substrate, the structural and optical properties were studies through UV-VIS, IR, XRD measurements, films have been operated as a sensor of vapor  H2SO4 and HCl  acids.

View Publication Preview PDF
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Adoption of multi – model Assignment Fuzzy to find Optimizing for the use of internet line in the Ministry of Science and Technlogy
...Show More Authors

We have provided in this research model multi assignment  with  fuzzy function goal has been to build programming model is correct Integer Programming fogging  after removing the case from the objective function data and convert it to real data .Pascal triangular graded mean using Pascal way to the center of the triangular.

The data processing to get rid of the case fogging which is surrounded by using an Excel 2007 either model multi assignment  has been used program LNDO to reach the optimal solution, which represents less than what can be from time to accomplish a number of tasks by the number of employees on the specific amount of the Internet, also included a search on some of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
The effect of creating knowledge according to the model (Nonaka & Takeuchi, 1995) on organizational ambidexterity: A study on a sample of Iraqi private banks
...Show More Authors

Purpose - This study relies on the descriptive and analytical approach through collecting and analyzing the necessary data, as this approach focuses on polling the opinions of the research sample and its directions, and aims to develop a model that studies the relationship between knowledge creation and organizational ambidexterity in Iraqi private banks and verifying its validity experimentally.

Design / Methodology / Introduction - A survey was conducted through a questionnaire form to collect data from a sample of (113) managers in private commercial banks. In addition, this study used the AMOS program and the ready-to-use statistical program package (SPSS V.25) to test the proposed hypotheses of the t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 02 2015
Journal Name
International Journal Of Engineering Research And General Science
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch

... Show More
View Publication Preview PDF