In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB domain. The applied modulation technique is based on making uniform quantization to the block mean value of the color bands. The tests indicated that the proposed block mean modulation method of the sprite blocks showed robust watermark embedding; it was capable to withstand against lossy JPEG.
A descriptive study, which was using an assessment approach, was conducted for the
determination of the impact of rheumatoid arthritis and osteoarthritis patient’s functional disability
upon their life style. The study was carried out at the Rheumatology and outpatients clinics of ALKarama
Teaching Hospital, Baghdad Teaching Hospital AL-Kindey Teaching Hospital and Specialized
surgeries Teaching Hospital for the period of October 15th 2003 through May 13th 2004 in Baghdad
City. A purposive (non-probability) sample of (245) arthritis patients which was comprised (111)
rheumatoid arthritis patients and (134) osteoarthritis patients, was selected out of the early stated
settings. The questionnaire was comprised of
The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreIn this study, hydroxyapatite (HAP, Ca10(PO4)6(OH)2) has been prepared as bioceramic material with biological specifications useful to used for orthopedic and dental implant applications. Wet chemical processing seems to form the fine grain size and uniform characteristic nanocrystalline materials by the interstice factors controlling which affected the grain size and crystallinity in order to give good mechanical and/or constituent properties similar as natural bone. Fluorinated hydroxyapatite [4-6 wt% F, (FHA, Ca10(PO4)6(OH)2–Fx] was developed in new method for its posses to increased strength and to give higher corrosion resistance in biofluids than pure HAP moreover reduces the risk of dental caries. The phase's and functional groups
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show More<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e
... Show MoreInduced EF is among the most important of advanced oxidation processes (AOPs) It was employed to treat different kinds of wastewater. In the present review, the types and mechanism of induced EF were outlined. Parameters affecting this process have been mentioned with details. These are current density, pH, H2O2 concentration, and time. The application of induced electro Fenton in various sectors of industries like textile, petroleum refineries, and pharmaceutical were outlined. The outcomes of this review demonstrate the vital role of induced EF in treatment of wastewater at high efficiency and low cost in contrast with conventional technique
Abstract
The prevention of bankruptcy not only prolongs the economic life of the company and increases its financial performance, but also helps to improve the general economic well-being of the country. Therefore, forecasting the financial shortfall can affect various factors and affect different aspects of the company, including dividends. In this regard, this study examines the prediction of the financial deficit of companies that use the logistic regression method and its impact on the earnings per share of companies listed on the Iraqi Stock Exchange. The time period of the research is from 2015 to 2020, where 33 companies that were accepted in the Iraqi Stock Exchange were selected as a sample, and the res
... Show MoreDam break is series phenomenon that can result in fatal consequences and loss of properties. Unfortunately, the observed consequences can only be available after the dam breaks. Therefore, it is important to anticipate what will happen prior to dam break to issue suitable warning and locate the possible risk areas. This study attempts to simulate the case of dam break in Blue Nile at Roseires dam and see its consequences downstream. Roseires dam lies at a distance of 630 km south of Khartoum, Sennar dam lies at about 260 km downstream of Roseires dam. In this study hydraulic model is developed based of Hydraulic Engineering Centre (HEC), River Analysis System (RAS), and HEC- RAS. The HEC-RAS based model is calibrated and validated usi
... Show More