Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various attacks.
The impact of applying the K-W-L self-scheduling technique on first-year intermediate students' learning of basic volleyball skills, Ayad Ali Hussein*, Israa Fouad Salih
The research aims to identify the effect of teaching according to the augmented reality on the technique of the visual thinking skills among scientific fifth-grade students in a biology course. In order to achieve the goal of the research, the researcher adopted the experimental approach with the partial set of the two equal groups with the dimensional test of visual thinking skills, The research population represented all the scientific students of the fifth grade for morning government schools affiliated to the General Directorate of Education of Baghdad / Karkh II, alshakerin preparatory for boys was chosen intentionally, in which two groups were chosen for this study, one group is chosen randomly as the control group via lottery, whe
... Show MoreThe problem of steady, laminar, natural convective flow in an square enclosure with and without partitions is considered for Rayleigh number (103-106) and Prandtl number (0.7). Vertical walls were maintained isothermal at different temperatures while horizontal walls and the partitions were insulated. The length of partition was taken constant. The number of partitions were placed on horizontal surface in staggered arrangement from (1– 3) and ratio of partition thickness (H/L= 0.033, 0.083, 0.124). The problem is formulated in terms of the vorticity-stream function procedure. A numerical solution based on a program in Fortran 90 with the finite difference method is obtained. Representative results illustrating the effects of the thickn
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThe aesthetic and technical expertise help in producing the artistic work and achieving results in aesthetic formulations that reflect the aesthetic and expressive dimensions and the reflective dimensions of the pottery, surpassing its traditions, asserting its active presence in life, cherishing it even when it breaks or get damaged by employing techniques that are originated from the Japanese environment.
The research problem is to study how ( Kintsugi) technique and similar techniques are used to create new rebirths of pottery piec
... Show MoreThe aim of this paper is to design artificial neural network as an alternative accurate tool to estimate concentration of Cadmium in contaminated soils for any depth and time. First, fifty soil samples were harvested from a phytoremediated contaminated site located in Qanat Aljaeesh in Baghdad city in Iraq. Second, a series of measurements were performed on the soil samples. The inputs are the soil depth, the time, and the soil parameters but the output is the concentration of Cu in the soil for depth x and time t. Third, design an ANN and its performance was evaluated using a test data set and then applied to estimate the concentration of Cadmium. The performance of the ANN technique was compared with the traditional laboratory inspecting
... Show MoreThe aim: In this study, we present and evaluate the vest-over-pants technique as a simple way to correct urethrocutaneous fistulas after hypospadias. Materials and methods: Between October 2018 and June 2020, twenty male patients aged 5 to 20 years came to us with post hypospadias repair fistula, these patients underwent vest-over-pant repair of their fistula. The size of fistula was ranging between 2.5-5 mm. The distribution of fistula was coronal (3 patients), distal penile (9 patients), midshaft (2 patients) and proximal penile (6 patients). In 14 patients there were single fistula and 6 patients had more than one fistula. Eleven of patients were exposed to a previous failed fistula repair procedure. Results: Six months after the operati
... Show MoreThe importance of our research is that it examines the causes and sources of the security challenges in the internal security environment of the GCC countries, and aims to address the most important issues that are of great interest, namely, the issue of inter-GCC differences and addressing the issues of regional security for the Gulf region, After it is one of the most dynamic and more polarized areas for the emergence of threats and challenges because of the multiplicity of sources of threat and their complexity due to the specificity of the strategic environment and the negative repercussions it can have on the Gulf region, especially the issue of regional security of the Gulf Cooperation Council Which has become a magnet for competing i
... Show MoreIn vitro tests have been carried out to find out the efficacy of watery extracts of garlic Allium sativum and hot pepper Capsicum spp. against the trophozoites of Entamoeba histolytica cultivated in liver infusion agar media at 37 c . The doses of ( 0.01, 0.05 ,0.1, 0.5, 1 ml )of garlic and hot pepper watery extracts were added to certain number of E. histolotica trophozoits for exposure time of 24 hrs., the mortality percentage of trophozoites treated with garlic extract were ( 14.82 %, 31.05% ,46.16% , 64.29% , 92.7%) respectively , these percentages were very close to that obtained from the treatment with the hot peper extract which were (17.86%, 32% , 44% ,66.67% ,100%) respectively . Generally these results showed that the ga
... Show MoreThe research aims to identify the tax policy strategy adopted in Iraq after the change of the tax system in 2003 and beyond, and then make a comparison of the two strategies on corporate data whether they are charged with progressive tax rates and after the change of the system as the tax rates became fixed, and then indicate the changes In the tax proceeds, and knowing the imensions of the approved tax policy, is it a tax reform strategy or a strategy to attract investments.The research started from the problem of exposure of the Iraqi tax system to several changes, as this led to a reflection on the technical organization of taxes, in terms of the tax rate.The descriptive analytical approach was chosen to study the actual reality of th
... Show More