نتایج جستجو برای: combination of data hiding and cryptography
تعداد نتایج: 24168851 فیلتر نتایج به سال:
Data compression is an important part of information security because compressed data more secure and easy to handle. Effective technology creates efficient, secure, easy-to-connect data. There are two types algorithm techniques, lossy lossless. These technologies can be used in any format such as text, audio, video, or image file. The main objective this study was reduce the physical space on ...
abstract the present study deals with a comparison between reactive and pre-emptive focus-on-form in terms of application and efficiency. it was conducted in an intermediate english class in shahroud. 15 male learners participated in this research and their age ranged from 18 to 25. a course book, new interchange 3, and a complementary book were used. every session the learners gave lectures o...
previous studies have aimed at testing a hypothesis but the present study is data-first research in which researcher tries to form a theory from data rather than the use of data to test a hypothesis. this study aims at exploring teachers perceptions of the strengths and weaknesses of the current syllabus for college preparatory course. eight experienced teachers were selected to collect data du...
abstract poor reading comprehension can result in failure in using references, benefiting from professional gatherings and resources, keeping up with the growing body of knowledge in the virtual world of the internet, and failing to achieve in efl programs. the purpose of the present quasi-experimental study was to explore the effects of background knowledge and previewing narrative and expos...
In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...
this study was conducted to investigate the impact of portfolio assessment as a process-oriented assessment mechanism on iranian efl students’ english writing and its subskills of focus, elaboration, organization, conventions, and vocabulary. out of ninety juniors majoring in english literature and translation at the university of isfahan, sixty one of them who were at the same level of writing...
this ethnographic case study research was carried out in a private school setting in the context of iran. the research tried to explore the analysis and identity construction of a group of learners and teachers along with the content analysis of books on the basis of four types of commodified, political, national and narrative identities. how english language learners and teachers in an informa...
a simple, rapid and low-cost scanner spectroscopy method for the glucose determination by utilizing glucose oxidase and cdte/tga quantum dots as chromoionophore has been described. the detection was based on the combination of the glucose enzymatic reaction and the quenching effect of h2o2 on the cdte quantum dots (qds) photoluminescence.in this study glucose was determined by utilizing glucose...
abstract the current study set out to address the issue as to whether the implementation of portfolio assessment would give rise to iranian pre-intermediate efl learner autonomy. participants comprised 60 female in pre-intermediate level within the age range of 16-28.they were selected from among 90 language learners based on their scores on language proficiency test -key english test. then, t...
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید