ريل لسادة الكيسياء َ جؼ البحث الى التعخؼ عمى أثخ استخاتيجية فجػة السعمػمات في التح َى جؼ البحث فقج صيغت الفخضية التي َ تػسط , والتحقق مغ ى ُ جى شلاب الرف الثاني الس َ ل جؼ البحث أعتسج الباحث َ تتعمق بالتحريل ولتحقيق ى ػعتيغ متداويتيغ ُ بي لسجس ِ ي السشيج التجخ ريل الجراسي , تكػنت عيشة البحث مغ َ ) شالب مغ شلاب ٗٛ( ذواتي اختبار بعجي لمتح -ٕٕٕٓالرف الثاني الستػسط في ( متػسصة الذييج خزيخ جاسع العارضي ) لمعاـ الجارسي ( ا ٕٗ) حيث بمغ عجد شلاب السجسػعة التجخيِبية (ٕٕٖٓ َ ) شالب , ٕٗ ) شالب و الزبصة ( ت السجسػعتاف في بعس الستغيخات ( العسخ الدمشي بالذيػر , التحريل الجراسي لمػالجيغ َ وكػفئ , اختبار الحكاء , اختبار السعمػمات الدابقة لسادة الكيسياء ) , تع اعجاد اختبار تحريمي لسادة فقخة مػضػعية مغ نػع الاختيار مغ متعجد , وتع (40)الكيسياء وتألف اختبار التحريل مغ جسػعة الزابصة َ ت الس ُ فق استخاتيجية فجػة السعمػمات ودرس ُ جسػعة التجخيبية عمى و َ تجريذ الس جسػعتي البحث ُ تبار التحريل عمى كلا م ُ نتياء التجخبة شبق اخ ِ تيادية وعشج ا َ خيقة اع َ وفق الص . ابصة َ يبية والز ِ التجخ وقج أضيخت الشتائج ػد فخؽ ُ : الى وج ُ ذ ج مدتػى دلالة َ و دلالة احرائية عش (0.05) جػة َ يجية ف ِ ات ػا عمى وفق استخ ُ بية الحيغ درس ِ ي جسػعة التجخ ُ تػسط درجات شلاب الس َ غ م ِ بي جات شلاب السجسػعة الزابصة الحي درسػا عمى وفق الصخيقة َ السعمػمات وبيغ متػسط در الاعتيادية في الاختبار التحريمي لرالح السجسػعة التجخيبية
Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreGIS is characterized by great potentialeties to deal with huge geographical data and conclude what is necessary for it. It was very useful to get use of the potentialities of this system of GIS in the field of archaeology and to harvest very accurate results in a relatively short time, compared to the old archaeological methods.
Research topic: (The Epistemological Foundations for Comparison of Religions by al-Amiri)
The research sought to study the topic with: a descriptive methodology by investigating the components of al-Amiri's approach to the interfaith comparison. And analytical, by showing the applied perception of an objective model in the comparison of religions to answer two questions: What are the cognitive foundations of al-Amiri? And what is his approach to establishing an objective comparison between religions?
The research started by introducing Abu al-Hassan al-Amiri, and then presented four topics: An introduction to al-Amiri's efforts in the interfaith comparison, his knowledge foundations, an applied model
... Show MoreThe research aims to identify the relationship between mathematical ability and academic resilience among secondary school students. The research sample consisted of (280) students of the fourth scientific grade in secondary and preparatory schools of the General Directorate of Education in Baghdad / Karkh 2. The researchers built - based on previous studies and literature - a test of mathematical ability and a measure of academic resilience. The researchers used the T-test and Pearson's correlation coefficient to compare the results. The results revealed that fourth-grade students possessed mathematical ability and academic resilience. The research proved the existence of a positive correlation between mathematical ability and academic
... Show MoreUncompleted Personality and it’s relation with Some Variables of the University Students
The current research aims to determine the intellectual security and the psychological resilience of Secondary school students and how these two variables are related to each other. The study also seeks the extent to which psychological resilience contributes to intellectual security
The research sample consisted of (420) students from the Secondary stage in the Directorate of Education of Baghdad / Rusafa III. Two scales were administered to the participants to collect the needed data. As for the analysis of data, Pearson correlation coefficient, T-test, and the Regression analysis were employed, the results revealed:
- The members of the sample have an intellectual Security.
- The members of the sample have
What we observe from the weakness of the students in some of different subjects may be due to that students are learning these traditional methods and competing to acquire the mark, and attain their teachers' interest ,then their only aim becomes the academicsuccess, and this is whatcontradicts the modern educational philosophy.
Education needs to be providing it with new ideas and methodologies toprepare an emerging demonstrated scientific reason to distance them from the tradition and indoctrination that do not create generations able to address theexpected problems.
The cognitive behavior of reflectiveincludes planning skil
... Show MoreAcquisition of metacognition has an effective and important role in educational process, so it can reduce difficulties faced by learners during theirunderstanding of the subjects.
Brown (1980) considers that it is conscious and reflective controlcarried out by the individual in his actions and cognitive responses through the use of self-regulation skills (planning, monitoring and evaluation).
The search problem raises through following question: Havestudents ofhigh school for distinct metacognition?
Metacognition is very important , so the effective learninginvolves planning and goalsetting, and monitoring the progress of the individual and adapted as needed, and allthese activities are metacognition i
... Show MoreThe study aims budget in grades use of smart phones to individuals (sample) according variable sex (males and females) and used researcher descriptive analytical method consisted sample of (300) students have chosen the way stratified random, and the study variables (academic achievement of students, sex and the use of Smart phones) resolution was adopted as a tool for data collection. The most important results of the study that females are more commonly used for smart phones, as well as the existence of a positive relationship between the inverse statistically significant use of smart phones and the rate of school for students and the use of smart phones h
... Show MoreFakhruddin`s policy toward Loveign policy aims to develop & cane his relationships with the countries of Europe diplomatic, military and economic relations with this or that country; So his policy contains holding conventions and treaties with the countries of Europe This is an important step to build a modern civil state independent from the Ottoman Empire