Preferred Language
Articles
/
bsj-7926
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 30 2020
Journal Name
College Of Islamic Sciences
The Breadth in the meaning of the "from Surah Maryam as a model.
...Show More Authors

 

Prepositions have a key function, which is to associate parts of a sentence, called letters In addition, it adds the meanings of the verbs to the names, ie reached by them, and called by the coffin characters Qualities..

          I chose to search for the meaning of the preposition "from" in Surat Maryam to know its meanings in terms of originality and expansion, so the title of the research (the meanings of preposition "from" in terms of originality and expansion in Surat Maryam model(

 

View Publication Preview PDF
Publication Date
Wed Sep 29 2021
Journal Name
College Of Islamic Sciences
The provisions of the epidemic in jurisprudence and its principles The (Covid-19) epidemic is a model
...Show More Authors

Abstract

Epidemics that afflict humankind are descending renewed, plaguing them in the place and time they spread.

- The epidemic affects individuals and the movement of societies, and its treatment requires dealing with it according to Sharia, taking into account the current data and developments.

- Integrative jurisprudence: it is intended to know the practical legal rulings deduced from the combination of evidence of two or more sciences related to one topic related to it, and among these calamities is the Corona Covid-19 pandemic.

 - It is permissible to use sterile materials that contain a percentage of alcohol in sterilizing hands and fogging places, including mosques.

T

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The history of rational thought for the investment by human capital and the investing in it.
...Show More Authors

The investment however "was its description and meaning, it remains a resident" in the composition of capital assets located in the forefront of the creation of productive assets, and this means that the investment in the productive sectors is a priority in achieving capital accumulation, on any other investment that takes place with the stages of advanced development of formation , not forgetting "to humans and investment humans as head of real money product, the source of the economic surplus and accumulation, and the source of producing values, and if human labor was the source of value, and the human was the source of work, therefore humanitarian work on different levels and skills presents capital", so the investment in huma

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Bionatura
STUDY THE TIGRIS RIVER IN SOUTH OF BAGHDAD CITY AND MAY USE IT AS IRRIGATION WATER
...Show More Authors

Scopus (1)
Scopus
Publication Date
Wed Sep 11 2024
Journal Name
Edelweiss Applied Science And Technology
The effectiveness of a proposed strategy according to the Fraunhofer model of knowledge management in the achievement of second intermediate female students in mathematics
...Show More Authors

The goal of the research is to identify the effectiveness of using a proposed strategy according to the Fraunhofer model of knowledge management in mathematics achievement for second-grade female students in middle and high schools affiliated with the General Directorate of Education in Baghdad / Al-Karkh II. The objective was to prove the following null hypothesis: "The average scores of the experimental group who will study with the proposed strategy according to the Fraunhofer model and the scores of the control group students who will study in the usual way in the mathematics achievement test are not statistically significant different at the significance level (0.05)." The General Directorate of Education of Baghdad / Al-Karkh

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Sep 11 2019
Journal Name
Aip Conference Proceedings
Estimation of shock wave position in plasma plume using Sedov-Taylor model
...Show More Authors

In this work, radius of shock wave of plasma plume (R) and speed of plasma (U) have been calculated theoretically using Matlab program.

Publication Date
Wed Oct 01 2025
Journal Name
Journal Of Economics And Administrative Sciences
A Modified Fama-MacBeth Model based on the Single-Index Model
...Show More Authors

The aim of this essay is to use a single-index model in developing and adjusting Fama-MacBeth.  Penalized smoothing spline regression technique (SIMPLS) foresaw this adjustment.  Two generalized cross-validation techniques, Generalized Cross Validation Grid (GGCV) and Generalized Cross Validation Fast (FGCV), anticipated the regular value of smoothing covered under this technique. Due to the two-steps nature of the Fama-MacBeth model, this estimation generated four estimates: SIMPLS(FGCV) - SIMPLS(FGCV), SIMPLS(FGCV) - SIM PLS(GGCV), SIMPLS(GGCV) - SIMPLS(FGCV), SIM PLS(GGCV) - SIM PLS(GGCV). Three-factor Fama-French model—market risk premium, size factor, value factor, and their implication for excess stock returns and portfolio return

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 07 2023
Journal Name
Journal Of Educational And Psychological Researches
Multiple Intelligence Test Item Selection-Based on Howard Gardner's MI Model Using a Generalized Partial Estimation Model: Ministry of Education \ Karkh First Directorate of Education
...Show More Authors

The aim of the research is to examine the multiple intelligence test item selection based on Howard Gardner's MI model using the Generalized Partial Estimation Form, generalized intelligence. The researcher adopted the scale of multiple intelligences by Kardner, it consists of (102) items with eight sub-scales. The sample consisted of (550) students from Baghdad universities, Technology University, al-Mustansiriyah university, and Iraqi University for the academic year (2019/2020). It was verified assumptions theory response to a single (one-dimensional, local autonomy, the curve of individual characteristics, speed factor and application), and analysis of the data according to specimen partial appreciation of the generalized, and limits

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 30 2015
Journal Name
Statistical Analysis Of The Relations Between Api,specific Gravity And Sulfur Content In The Universal Crude Oil
Statistical Analysis of the Relations between API, Specific Gravity and Sulfur Content in the Universal Crude Oil
...Show More Authors

Publication Date
Mon Mar 30 2026
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Adaptive Security Model for Data Protection Using Behavioral User Authentication
...Show More Authors

Credential compromise is one of the most widespread security threats, allowing adversaries to bypass traditional authentication measures and impersonate legitimate users. Traditional intrusion detection systems are often based on network-level or macro-behavioral indicators, which can be easily spoofed by an attacker, thus compromising the effectiveness of those mechanisms. This study presents an improved adaptive intrusion detection system to authenticate user behavior based on micro-digital behavioral profiling. It involves the use of timing of keystrokes, micro-mouse, navigation in the application, and interaction rhythm signatures. The proposed system uses a hybrid model consisting of Long Short-Term Memory (LSTM) sequence predi

... Show More
View Publication
Crossref