In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB domain. The applied modulation technique is based on making uniform quantization to the block mean value of the color bands. The tests indicated that the proposed block mean modulation method of the sprite blocks showed robust watermark embedding; it was capable to withstand against lossy JPEG.
Breast cancer is the commonest cancer affecting women worldwide. Different studies have dealt with the etiological factors of that cancer aiming to find a way for early diagnosis and satisfactory therapy. The present study clarified the relationship between genetic polymorphisms of BRCA1 & BRCA2 genes and some etiological risk factors among breast cancer patients in Iraq. This investigation was carried out on 25 patients (all were females) who were diagnosed as breast cancer patients attended AL-Kadhemya Teaching Hospital in Baghdad and 10 apparently healthy women were used as a control, all women (patients and control) aged above 40 years. The Wizard Promega kit was used for DNA isolation from breast patients and normal individuals. B
... Show MoreThe complexes of para-chloranil as electron acceptor and the anions of amide, azide and cyanide as electron donors in aqueous ethanol as a solvent, were studied spectrophotometrically . The reactions lead to the formation of charge transfer complexes. The CT complexes were stable in excess acceptor concentration, while they were underwent another transformations in excess donors concentrations. Stoichiometries were determined, the molecular ratio was determined by continuous variation method (Job method) and is was 1:1 (donor: acceptor). The maximum wavelength (λ max.), the energy (hυCT), ionization potential (Ip) and activation energy (w ) of excited state f
... Show MoreThe research aims to measure the psychological security of social working in the courts, to measure the motivation of achievement for social researchers working in the courts. In addition to, identify the Psychological security and its relation to the motivation of achievement for social researchers working in the courts. To achieve these aims, the researcher adopted two scales: Maslow scale for Psychological security, which was translated to Arabic by Dwany and Dirany 1983 consisted of (75) items. The second scale is Othman scale for achievement motivation 2014 consisted of (24) items. The two scales had been applied to a sample consisted of (100) social researchers working in the courts of Baghdad with its two branches Al-karkh and Al-
... Show MoreEducation specialists have differed about determining the best ways to detect the
talented. Since the appearance of the mental and psychological measurement movement, some
scholars adopted intelligence ratios as a criterion to identify the talented and others went to
rely on the degree of academic achievement. Each of these two methods has its own flaws and
mistakes and a large number of talented children were victims of these two methods.
Therefore the need to use other scales for the purpose of detection of talented children
appeared because they provide valuable information which may not be obtained easily
through objective tests and these scales are derived from consecutive studies of gifted andtalented children
There are many diseases that affect the arteries, especially those related to their elasticity and stiffness, and they can be guessed by estimating and calculating the modulus of elasticity. Hence, the accurate calculation of the elastic modulus leads to an accurate assessment of these diseases, especially in their early stages, which can contribute to the treatment of these diseases early. Most of the calculations used the one-dimensional (1D) modulus of elasticity. From a mechanical point of view, the stresses to which the artery is subjected are not one-dimensional, but three-dimensional. Therefore, estimating at least a two-dimensional (2D) modulus of elasticity will necessarily be more accurate. To the knowledge of researchers, there i
... Show MoreThe research aims to evaluate Islamic electronic libraries and their service for downloading research and illustrated books, explaining their origins, features and types. The research was limited to the libraries available on the Internet that provide the service for downloading research and illustrated books. The researcher relied on the survey approach to identify the libraries and a sample of them (20 libraries) was selected. For the purpose of evaluating it according to five criteria related to the preparation and publication of Islamic electronic libraries (the responsible party, the goals and objectives, the year, the services it provides, the sections and subject specializations of its contents) and five criteria related to the servi
... Show MoreThe electrode in the microbial fuel cell has a significant effect on cell performance. The treatment of the electrode is a crucial step to make the electrode surface more habitable for bacteria growth, thus, increases the power production as well as waste treatment. In the current study, two graphite electrodes were treated by a microwave. The first electrode was treated with 100W microwave energy, while the second one was treated with 600W microwave energy. There is a significant enhancement in the surface of the graphite anode after the pretreatment process. The results show an increase in the power density from 10 mW/m2 to 15 mW/m2 with 100w treatment and to 13.47 mW/m2 with 600w treatment. An organic
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreTight oil reservoirs have been a concerned of the oil industry due to their substantial influence on oil production. Due to their poor permeability, numerous problems are encountered while producing from tight reservoirs. Petrophysical and geomechanical rock properties are essential for understanding and assessing the fracability of reservoirs, especially tight reservoirs, to enhance permeability. In this study, Saadi B reservoir in Halfaya Iraqi oil field is considered as the main tight reservoir. Petrophysical and geomechanical properties have been estimated using full-set well logs for a vertical well that penetrates Saadi reservoir and validated with support of diagnostic fracture injection test data employing standard equations
... Show More