Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.
Research problem: the problem of the current research can determine the dimensions of answering the following question - What is the impact of the use strategy summaries tribal collection and retention in the second grade students in the middle of history?
The importance of research: In order to achieve the desired education and access to educational goals required, and to address all the challenges facing the educational process, so you may need to use methods and different educational methods in the teaching of social history, particularly, of those methods and modalities to adopt strategies tribal in teaching, has chosen researcher summaries tribal style, which is one of the strategies of goo
The verbal formula // i3-gal2 //is a commonly form in the written Sumerian economic texts, starting from the early dynastic period (2900-2372 BC), ending with the Ur III dynasty (2112-2004 BC). This formula has appeared either without infixes, or accompanied by infixes like / in-da-gal2/, corresponded in Akkadian the formula: ibaššu ,which is means "to found, to Storage ", As to the formula / da / come to indicate "to found with, to storage with--).
Performance measures are a central component of management control system, making good planning and control decisions requires information about how different subunits of organizations have performed. To be effective, performance measures (both financial and nonfinancial) must also motivate managers and employees at all levels of organization to strive to achieve organization goals.
To give aclear picture about performance must be used compound measure, that was best than single measure.
Altman model can be used as a compound performance measure that measures the performance by tied a sum of variables, due to make weight for every variable to reach for performance.
מחקר זה בוחן את התפתחות הדימוי של ערבים בספרות הישראלית דרך עבודותיהם של אלי עמיר ודורית רביניאן שני סופרים חשובים שסיפוריהם מאתגרים סטריאוטיפים שוררים ומרחיבים את ההבנה התרבותית הניתוח הממוקם במסגרת הספרות המזרחית עוקב אחר האופן שבו דמויות ערביות עוברות מדמויות שוליים לאנשים מורכבים ומעודנים המשקפים שינויים סוציו פוליטיים רחבים יותר על ידי השוואת חקר הזהות והעקירה של עמיר בסביבה היהודית בבגדד לבין
Abstract
Objective(s): To determine the interventional program effectiveness on nurses' practices concerning diet instructions for orthopedic patients treated by internal fixation devices.
Methodology: A quantitative approach using prexperimental design is conducted to determine the effectiveness of an interventional program on nurses’ practices regarding orthopedic patients diet instruction and teaching after internal fixation implemented. The study has started from 1st of April 2022 and ended on 15th of December, 2022. The conduction of the study in Misan governorate / Al-Zaharawy surgical hospital. A non-probability, purpo
... Show MoreThe research aims at the following:
- Identifying the level of internal quantity efficiency in Medical colleges, University of Baghdad by determining the level of productivity for one group for the total batch according to sex variable (males and females). Procedures of the study
The researcher used the descriptive and analytical method has been used by following them up enhanced by flow indicators of students for one session depending on special statistical data analyss .
The results are as follows:
- The Faculty of Medicine were higher productivity scholarships for one year and two years of schooling, as well as the highest in the efficiency of the Faculty o
... Show MoreIn this paper we present an operational computer vision system for real-time motion detection and recording that can be used in surveillance system. The system captures a video of a scene and identifies the frames that contains motion and record them in such a way that only the frames that is important to us is recorded and a report is made in the form of a movie is made and can be displayed. All parts that are captured by the camera are recorded to compare both movies. This serves as both a proof-of- concept and a verification of other existing algorithms for motion detection. Motion frames are detected using frame differencing. The results of the experiments with the system indicate the ability to minimize some of the problems false detec
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the
... Show MoreSuperconducting compound Bi2Sr2-xYxCa2Cu3O10+δ were Synthesized by method of solid state reaction, at 1033 K for 160 hours temperature of the sintering at normal atmospheric pressure where substitutions Yttrium oxide with Strontium. When Y2O3 concentration (0.0, 0.1, 0.2, 0.3, 0.4 and 0.5). All specimens of Bi2Sr2Ca2Cu3O10+δ superconducting compounds were examined. The resistivity of electrical was checked by the four point probe technique, It was found th