Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD on it, the diagonal matrix is selected to determine its norm. The four norms will be processed to produce one unique number used as a watermark and this number can be developed in future by exploiting some other features in constructing watermark number other than SVD process to construct two watermark numbers, each one of them owned special methodology, for avoiding some challenges and changings in the transformation process.
Theatrical production mechanisms were determined according to the extents of the theatrical performance, the directing plan, and the ideas that the theatrical performance seeks to convey to the audience. Accordingly, theatrical production mechanisms differ between one theatrical performance and another according to the requirements of each of them and the surrounding circumstances that accompany the production of theatrical performance, and in order to search for production mechanisms and their repercussions on the show. Theatrical The current research was divided into four chapters, namely (Chapter One - Methodology), which identified the research problem in the following question: What are the production mechanisms and their implicatio
... Show MoreInternet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-
... Show Moreمشكلة البحث واهميته:-
اخذ موضوع العولمة قدراً وافياً من الاهتمام سواء على المستوى الاكاديمي او على مستوى اجهزة الاعلام والرأي العام ومختلف التيارات السياسية والاقتصادية والاجتماعية ، فلا يخلو أي لقاء اقتصادي او سياسي او اجتماعي من الحديث عن العولمة اذ نشرت العديد من الابحاث والدراسات وعقدت الكثير من الندوات والمؤتمرات لدراسة العولمة وبيان اثارها ولعل ذل
... Show MoreMuch has been written about Baghdad in the history books and documents ,about the Origin of its call , Reality ,history ,peoples ,Rulers and all that have passed since the beginning of creation and so far...
The searchers opinions are variant in determining the extent of impacting political risk in the host country on foreign direct investment decision. (Aharoni,1966) found, in his questionary study for group of foreign companies operating in India, that a political stability is one of the two most important factors, besides the market size, in the attraction of foreign investment, and its availability means that whether this specific country is good for foreign investment. On the other side, (Green and Benntt, 1972) are present a variant opinion to Aharonis opinion. They are reach to result state that a political instability do not impact on the general distribution of foreign i
... Show MoreConsider the (p,q) simple connected graph . The sum absolute values of the spectrum of quotient matrix of a graph make up the graph's quotient energy. The objective of this study is to examine the quotient energy of identity graphs and zero-divisor graphs of commutative rings using group theory, graph theory, and applications. In this study, the identity graphs derived from the group and a few classes of zero-divisor graphs of the commutative ring R are examined.
The research aims to identify the extent to which Iraqi private banks practice profit management motivated by reducing the taxable base by increasing the provision for loan losses by relying on the LLP it model, which consists of a main independent variable (net profit before tax) and independent sub-variables (bank size, total debts to total equity, loans granted to total obligations) under the name of the variables governing the banking business. (Colmgrove-Smirnov) was used to test the normal distribution of data for all banks during the period 2017-2020, and then find the correlation between the main independent variable sub and the dependent variable by means of the correlation coefficient person, and then using the multiple
... Show MoreAbstract
This study aims to find the relationships between social capital (social network, social trust, shared goals) and knowledge sharing (knowledge Donating, knowledge collecting) as independent variables and their impact on improving the quality of educational services (academic staffs quality, Quality of teaching methods and study curriculums). This research is an important, because it attempts to identify the relationship between social capital and the knowledge sharing and their effect on improving the quality of educational service for universities. The study problem was determined in several questions related to the nature of the correlation relationship - the impact between the different independent variables (
... Show MoreThe soft sets were known since 1999, and because of their wide applications and their great flexibility to solve the problems, we used these concepts to define new types of soft limit points, that we called soft turning points.Finally, we used these points to define new types of soft separation axioms and we study their properties.
Let R be a commutative ring with identity and M be a unitary R- module. We shall say that M is a primary multiplication module if every primary submodule of M is a multiplication submodule of M. Some of the properties of this concept will be investigated. The main results of this paper are, for modules M and N, we have M N and HomR (M, N) are primary multiplications R-modules under certain assumptions.