Preferred Language
Articles
/
bsj-7926
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 14 2018
Journal Name
International Journal Of Science And Research (ijsr)
Effect of the Active Thinking Model in the Achievement of Students of the Fifth Grade Applied Science of Physics and Their Pivotal Thinking
...Show More Authors

The aim of the current research is to identify the effect of the active thinking model in the achievement of students of the fifth grade applied science of physics, and their pivotal thinking by verifying the two zero hypotheses, where there is no significant difference at the level of significance (0.05) between the average scores of the experimental group who studied physics using the active thinking model and the average scores of the control group students who studied the same material in the usual way in the achievement test, as well as in the pivotal thinking test. The research sample consisted of (77) students of the applied fifth grade students in two divisions (a) and (b), randomly selected (a) to be the experimental group, and (b)

... Show More
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
HISTORY AND MODERNITY OF POETRY AS : A Reference Of The Modern Poem In Iraq
...Show More Authors

One of the most important intellectual issues, which receive attention is the issue of modernity, it has occupied the scholars of all time. However, modern poetry used to have special care in Iraq and in the Arab countries .. it is not strange that the concept of modernity is linked to history .. or having history as the most important dimension of its dimensions .. because Arab poetry is historical and it is moving into an area of ​​the past that is still active in terms of language and literary image .. When some poets found that changing and modernizing poetry became a necessity of evolution, and one of the fundamentals of modernization, the cultural impact did not respond to the desire of poets, and their impulse in modern poetry

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 23 2018
Journal Name
Entropy
Methods and Challenges in Shot Boundary Detection: A Review
...Show More Authors

View Publication
Scopus (65)
Crossref (59)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (9)
Crossref
Publication Date
Tue Dec 30 2008
Journal Name
Al-kindy College Medical Journal
Use of Ascetic Fluid Cholesterol as a Marker to Differentiate between Types of Ascetic Fluid
...Show More Authors

Background:- Cholesterol is high in ascetic fluid due
to malignancy and other causes of exudates.
Objective:-To use cholesterol as a marker to
differentiate between exudative and transudative
ascetic fluid and to compare that with other routine
parameters.
Methods:-Twenty eight patients were included in this
study 17 females with mean age of 41.9 years, 11
males with mean age of 48.2 years. The patients were
divided in group I suspected transudate, and group II
suspected exudate according to history and clinical
examination.
Ascetic fluid samples were sent for total protein,
albumin, and cholesterol measurement blood samples
were sent for serum protein and albumin measurement.
Results:-In this

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
An update on Nanoparticle Formulation Design of Piperine to Improve its Oral bioavailability: A Review
...Show More Authors

Piperine, a crystalline alkaloid compound isolated from Piper nigrum, piper longum, and other types of piper, has had many fabulous pharmacological advantages for preventing and treating some specific diseases, such as analgesic, anti-inflammatory, hepatoprotective, antimetastatic, antithyroid, immunomodulatory, antitumor, rheumatoid arthritis, osteoarthritis, Alzheimer's, and improving the bioavailability of other drugs. However, its potential for clinical use through oral usage is hindered by water solubility and poor bioavailability. The low level of oral bioavailability is caused by low solubility in water and is photosensitive, susceptible to isomerization by UV light, which causes piperine concentration to decrease. Many different

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
البحوث التربويةوالنفسية
Preparing a teacher’s guide for computer books for the intermediate stage according to learning styles
...Show More Authors

Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Resmilitaris
The right to property is a constitutional restriction on the work of the tax legislator
...Show More Authors

The study aims to reach a common point that achieves a balance between two interests, which are generally in conflict with the public interest and the interest of the individual owner of private property, by extrapolating the provisions of the constitutional judiciary that include the protection of private property, and this protection extends to every right of financial value and is not limited to a specific type, but It included everything that can be estimated with money, as ownership is no longer an advantage for the owner, but rather has become a right for him and a social function. The tax is imposed on what is derived from it, but if there is a need to prejudice it, the conditions, limits and restrictions expressly stipulated in the

... Show More
Scopus
Publication Date
Sun Sep 30 2018
Journal Name
Scientific Journal Of Silesian University Of Technology. Series Transport
Measuring the relative importance of applying engineering solutions to urban traffic intersections: a planning perspective
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sun Mar 01 2026
Journal Name
Al-mustansiriyah Journal Of Science
Epidemiological Study to Investigate a Possible Vector of Visceral Leishmaniasisin the Central Region of Iraq
...Show More Authors

An epidemiological study in Al-Mahmmodiya (50 km south Baghdad) to investigate a possible vector of Leishmaniasis were applied .This region is considered as a foci of Leishmaniasisaccording to the health association statistics. CDC light traps were used to collect the insects nightly. Insects were collected by Indoor application as human dwellings and animal shelters and Outdoor application as rodent's barrows and field trees. Sand flies were transported to the laboratory, isolated and identified according to the identification keys in Tropical Biological Researches Unit at the Collage of Science / University of Baghdad. Must of the collected sand flies were belonging to three species PhlebotomuspapatasiScopoli(45%), PhlebotomusalexandriSin

... Show More
View Publication