Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show More
The article critically analyzes traditional translation models. The most influential models of translation in the second half of the 20th century have been mentioned, among which the theory of formal and dynamic equivalence, the theory of regular correspondences, informative, situational-denotative, functional-pragmatic theory of communication levels have been considered. The selected models have been analyzed from the point of view of the universality of their use for different types and types of translation, as well as the ability to comprehend the deep links established between the original and the translation.
Аннотация
This research utilized natural asphalt (NA) deposits from sulfur springs in western Iraq. Laboratory tests were conducted to evaluate the performance of an asphalt mixture incorporating NA and verify its suitability for local pavement applications. To achieve this, a combination of two types of NA, namely soft SNA and hard HNA, was blended to create a binder known as Type HSNA. The resulting HSNA exhibited a penetration grade that adhered to Iraqi specifications. Various percentages of NA (20%, 40%, 60%, and 80%) were added to petroleum asphalt. The findings revealed enhanced physical properties of HSNA, which also satisfied the requirements outlined in the Iraqi specifications for asphalt cement.
Consequently, HS
... Show MoreThis research utilized natural asphalt (NA) deposits from sulfur springs in western Iraq. Laboratory tests were conducted to evaluate the performance of an asphalt mixture incorporating NA and verify its suitability for local pavement applications. To achieve this, a combination of two types of NA, namely soft SNA and hard HNA, was blended to create a binder known as Type HSNA. The resulting HSNA exhibited a penetration grade that adhered to Iraqi specifications. Various percentages of NA (20%, 40%, 60%, and 80%) were added to petroleum asphalt. The findings revealed enhanced physical properties of HSNA, which also satisfied the requirements outlined in the Iraqi specifications for asphalt cement. Consequently, HSNA can serve as an
... Show MoreCovariance technique represents a design to bring out the decorative components And organized in unfamiliar a manner Turn to custom patterned to make a qualitative difference in the pattern of the general composition of the implicit overall,question research problem emerges Based on the above, (Is the aesthetic values of the property heterogeneities in Islamic architecture configurations decorations?). Detect it through the knowledge of the species and decorative components containing heterogeneities And his methods within each of Iraq and Iran and theoretical framework try to monitor the opinions and threads aesthetic perception in the Islamic and Construction decorative art formations in Islamic architecture and features of heterogenei
... Show MoreInformation and Communication Technology revolution has led to the emergence of electronic payment systems and their means And that the replacement of these modern means replace the traditional means (legal money) issued by the Central Bank has influenced the performance of monetary policy, especially that monetary policy is one of the most important policies used to achieve economic stability , The aim of the research is To know the impact of electronic payment systems on the tools of monetary policy as these means, such as cards and electronic money issued by credit institutions and companies, that is, the Central Bank is not responsible for issuance and spread And the lack of regulation by the Central Bank will lea
... Show MoreFace Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a
... Show More