The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject shou
... Show MoreAn abortion that occurs spontaneously is known as a miscarriage. Various effectors associated with abortion such as Genetic and uterine anomalies, Endocrinopathy, immunological dysfunctions, infectious agents, environmental contaminants, psychogenetic elements, and endometriosis. Maternal infections considered the main reason for pregnancy wastage in females with Bad Obstetric History (BOH). Candida albicans is a dimorphic fungus that can grow as yeast or filamentous cells and considered one of the limited species of the Candida genus that cause humans candidiasis. It is an opportunistic fungus that responsible for mucosal infections in the mouth and genital tract. Excessive growth of C. albicans will follow with Vulvovaginal candid
... Show MoreThe association of phytoplasma was investigated in symptomatic tomato (
Let be a module over a commutative ring with identity. In this paper we intoduce the concept of Strongly Pseudo Nearly Semi-2-Absorbing submodule, where a proper submodule of an -module is said to be Strongly Pseudo Nearly Semi-2-Absorbing submodule of if whenever , for implies that either or , this concept is a generalization of 2_Absorbing submodule, semi 2-Absorbing submodule, and strong form of (Nearly–2–Absorbing, Pseudo_2_Absorbing, and Nearly Semi–2–Absorbing) submodules. Several properties characterizations, and examples concerning this new notion are given. We study the relation between Strongly Pseudo Nearly Semei-2-Absorbing submodule and (2_Absorbing, Nearly_2_Absorbing, Pseudo_2_Absorbing, and Nearly S
... Show MoreThe concept of a 2-Absorbing submodule is considered as an essential feature in the field of module theory and has many generalizations. This articale discusses the concept of the Extend Nearly Pseudo Quasi-2-Absorbing submodules and their relationship to the 2-Absorbing submodule, Quasi-2-Absorbing submodule, Nearly-2-Absorbing submodule, Pseudo-2-Absorbing submodule, and the rest of the other concepts previously studied. The relationship between them has been studied, explaining that the opposite is not true and that under certain conditions the opposite becomes true. This article aims to study this concept and gives the most important propositions, characterizations, remarks, examples, lemmas, and observations related to it. In the en
... Show MoreThe purpose of this work is to construct complete (k,n)-arcs in the projective 2-space PG(2,q) over Galois field GF(11) by adding some points of index zero to complete (k,n–1)arcs 3  n  11. A (k,n)-arcs is a set of k points no n + 1 of which are collinear. A (k,n)-arcs is complete if it is not contained in a (k + 1,n)-arc
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More