The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the Normalized cross Correlation (NC). The experiments shows the error ratio of the proposed technique is (8%) while accuracy ratio is (92%) when the Curvelet Transform (CvT) is …
This paper presents the concepts of prepaths, paths, and cycles in α-topological spaces and studies them in orderable spaces. Also, many relationships are proved with their equivalences using some properties in topological spaces like compactness and locally connectedness.
Research Summary
First: the problem of research and its importance
The teacher's success in facilitating the students' learning and growth according to the educational and educational goals set out, he must identify the problems of discipline of students in the classroom in terms of sources and reasons and types and methods of prevention and treatment and the teacher to remember that success in his teaching and instruction is not completed more fully once he has the information And knowledge of the subject of the lesson, but must understand the dynamics of the group (class group) and master the skills of classroom management, su
... Show MoreDespite the development in the fields of communication and informatics, the book remains its distinguished presence and popular popularity as it is the oldest means to obtain knowledge, addressing the vast majority of society in different levels and levels of knowledge and culture. The design of the cover book portal and the structure of semolina semantic including the elements of construction and typography contribute to the activation of the relationship between form and content, and here lies the importance of this relativity and its role in enhancing the communicative dimension of the design of the book cover, and cast a shadow on the promotional and marketing effectiveness. Hence the importance of research, but the prob
... Show MoreHonorifics are linguistic expressions which maintain social as well as religious respect to other people. They are linguistic techniques which express politeness to other interlocutors. Semantically speaking, honorifics are of two types: al-Laqab (title) and al-Kuniya (teknonyms) following a specific word order. They form part of the Arab recognitions and are mold into their social and communicative competence.
The study focuses upon religious and regional honorifics which convey deference and respect. It assumes that religious and cultural recognitions play vital roles in formulating and embedding the sense of honorifics. It is hypothesized that Arab people express respect to religious personalitie
... Show MoreMethods of teaching plays an important vole in the educational process
because is the link between the teacher and the learner. The process of
teaching doesut fulfill the desirable results unless the methods of guiding and
teaching are provided and through a qualified educationalist capable of
communicating the syllabus to the students in an easy and clear way. In spite
of the diversity of the methods of teaching ,there is no one way suitable for all
the educational purposes , all the sciences ,all the subjects ,all the levels of
growth ,levels of teaching, maturity and intelligences ,all teachers and
educationalists and all the circum stances surrounding the teaching processes
.The teacher is the one who choos
The contemporary development applications on scientific areas of acyclic and cyclic Schiff bases and their complexes.
Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show More