Preferred Language
Articles
/
bsj-7168
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD on it, the diagonal matrix is selected to determine its norm. The four norms will be processed to produce one unique number used as a watermark and this number can be developed  in future by exploiting some other features in constructing watermark number other than SVD process to construct two watermark numbers, each one of them owned special methodology, for avoiding some challenges and changings in the transformation process. 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
The Ecological Risk Assessment of Mercury Contamination in a Mangrove Ecosystem of the Segara Anakan Cilacap, Indonesia
...Show More Authors

Ecological risk assessment of mercury contaminant has a means to analyze the ecological risk aspect of ecosystem using the potential impact of mercury pollution in soil, water and organism. The ecological risk assessment in a coastal area can be shown by mangrove zonation, clustering and interpolation of mercury accumulation. This research aims to analyze ecological risk assessment of potential mercury (including bioaccumulation and translocation) using indicators of species distribution, clustering, zonation and interpolation of mercury accumulation. The results showed that the Segara Anakan had a high risk of mercury pollution, using indicators like as the potential of mercury contaminant in water body was 0137±0.0137 ppm, substrate a

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Tue Apr 24 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Securing digital documents using digital watermarking
...Show More Authors

     The intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents.  But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..

In this research LSB  technique  has been used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Best Proximity Point Theorem for α ̃–ψ ̃-Contractive Type Mapping in Fuzzy Normed Space
...Show More Authors

The best proximity point is a generalization of a fixed point that is beneficial when the contraction map is not a self-map. On other hand, best approximation theorems offer an approximate solution to the fixed point equation . It is used to solve the problem in order to come up with a good approximation. This paper's main purpose is to introduce new types of proximal contraction for nonself mappings in fuzzy normed space and then proved the best proximity point theorem for these mappings. At first, the definition of fuzzy normed space is given. Then the notions of the best proximity point and - proximal admissible in the context of fuzzy normed space are presented. The notion of α ̃–ψ ̃- proximal contractive mapping is introduced.

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Hypercyclictty and Countable Hypercyclicity for Adjoint of Operators
...Show More Authors

Let be an infinite dimensional separable complex Hilbert space and let , where is the Banach algebra of all bounded linear operators on . In this paper we prove the following results. If is a operator, then 1. is a hypercyclic operator if and only if D and for every hyperinvariant subspace of . 2. If is a pure, then is a countably hypercyclic operator if and only if and for every hyperinvariant subspace of . 3. has a bounded set with dense orbit if and only if for every hyperinvariant subspace of , .

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
The Act Of An Operator
...Show More Authors

In this paper we will study some of the properties of an operator by looking at the associated S-act of this operator, and conversely. We look at some operators, like one to one operators, onto operators. On the other hand, we look at some act theoretic concepts, like faithful acts, finitely generated acts, singular acts, separated acts, torsion free acts and noetherian acts. We try to determine what properties of T make the associated S-act has any of these properties.

View Publication Preview PDF
Crossref
Publication Date
Mon Apr 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
δ-Hollow Modules
...Show More Authors

    Let R be a commutative ring with unity and M be a non zero unitary left R-module. M is called a hollow module if every proper submodule N of M is small (N ≪ M), i.e. N + W ≠ M for every proper submodule W in M. A δ-hollow module is a generalization of hollow module, where an R-module M is called δ-hollow module if every proper submodule N of M is δ-small (N δ  M), i.e. N + W ≠ M for every proper submodule W in M with M W is singular. In this work we study this class of modules and give several fundamental properties related with this concept

View Publication Preview PDF
Publication Date
Wed Oct 03 2018
Journal Name
Opcion
Evaluating the financial performance according to the traditional and modern financial indicators
...Show More Authors

The research aims to develop the general performance and improve the level of activity of private insurance companies in line with the current progress of the country. Besides, Evaluating financial performance to diagnose weaknesses and strengths in sample research companies and then developing appropriate solutions. The deviation in the financial performance of the research sample was revealed by measuring the various accounts of the company. The research sample included five companies in the private insurance sector listed in the Iraqi Stock Exchange Market, which represent the private insurance sector. The research concluded that the added economic value is a broad concept that goes beyond the traditional performance evaluation process a

... Show More
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Proposing Robust IRWs Technique to Estimate Segmented Regression Model for the Bed load Transport of Tigris River with Change Point of Water Discharge Amount at Baghdad City
...Show More Authors

Segmented regression consists of several sections separated by different points of membership, showing the heterogeneity arising from the process of separating the segments within the research sample. This research is concerned with estimating the location of the change point between segments and estimating model parameters, and proposing a robust estimation method and compare it with some other methods that used in the segmented regression. One of the traditional methods (Muggeo method) has been used to find the maximum likelihood estimator in an iterative approach for the model and the change point as well. Moreover, a robust estimation method (IRW method) has used which depends on the use of the robust M-estimator technique in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
A Characterization of Maximal Outerplanar-Open Distance Pattern Uniform Graphs
...Show More Authors

Let A ⊆ V(H) of any graph H, every node w of H be labeled using a set of numbers; , where d(w,v) denotes the distance between node w and the node v in H, known as its open A-distance pattern. A graph H is known as the open distance-pattern uniform (odpu)-graph, if there is a nonempty subset A ⊆V(H) together with  is the same for all . Here  is known as the open distance pattern uniform (odpu-) labeling of the graph H and A is known as an odpu-set of H. The minimum cardinality of vertices in any odpu-set of H, if it exists, will be known as the odpu-number of the graph H. This article gives a characterization of maximal outerplanar-odpu graphs. Also, it establishes that the possible odpu-number of an odpu-maximal outerplanar graph i

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Oct 02 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Using the wavelet analysis to estimate the nonparametric regression model in the presence of associated errors
...Show More Authors

Abstract The wavelet shrink estimator is an attractive technique when estimating the nonparametric regression functions, but it is very sensitive in the case of a correlation in errors. In this research, a polynomial model of low degree was used for the purpose of addressing the boundary problem in the wavelet reduction in addition to using flexible threshold values in the case of Correlation in errors as it deals with those transactions at each level separately, unlike the comprehensive threshold values that deal with all levels simultaneously, as (Visushrink) methods, (False Discovery Rate) method, (Improvement Thresholding) and (Sureshrink method), as the study was conducted on real monthly data represented in the rates of theft crimes f

... Show More