Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking types in the same system reaches better results and increases the power of the system and makes it robust against any attack and revel the modification if any at the same time. PSNR has been used as a performance metric to evaluate the study. The result of the new proposed watermark is 54. It is preferable to utilize both a fragile and a robust watermark simultaneously. Index Terms— Robust Watermarking, Fragile Watermarking, Embedded Value, Imperceptibility, Security.
This paper presents a comparative study of two learning algorithms for the nonlinear PID neural trajectory tracking controller for mobile robot in order to follow a pre-defined path. As simple and fast tuning technique, genetic and particle swarm optimization algorithms are used to tune the nonlinear PID neural controller's parameters to find the best velocities control actions of the right wheel and left wheel for the real mobile robot. Polywog wavelet activation function is used in the structure of the nonlinear PID neural controller. Simulation results (Matlab) and experimental work (LabVIEW) show that the proposed nonlinear PID controller with PSO
learning algorithm is more effective and robust than genetic learning algorithm; thi
The purpose of this research is to a treatment the impact of Views outliers to the estimators of a distributed arrival and service to the theory of queues and estimate the distribution parameters depending on the robust estimators, and when he was outliers greatest impact in the process of estimating the both distributions mentioned parameters, it was necessary to use way to test that does these data contain abnormal values or not? it was used the method ( Tukey ) for this purpose and is of the most popular ways to discover the outliers , it shows that there are views abnormal (outliers ) in the estimators of each of the distributional arrival and service, which have a significant impact on the calculation of these estimato
... Show MoreThe aim of the study was comparative between oxidative stress in diabetes mellitus using the measurement of some biophysical and biochemical parameters on two groups of diabetic patients, were conducted in the Al-Yarmuk Teaching Hospital,30 patients insulin dependent diabetes mellitus (IDDM) or type 1 ,their ages ranged between (15-45) and30 patients non- insulin dependent diabetes mellitus (NIDDM) or type 2,their ages ranged between (42-65).This study has been compared with 30 healthy subjects. The present study was demonstrated to evaluate the alteration in oxidative stress as measured by plasma and red blood cells Malondialdehyde (MDA) andchanges in antioxidant mechanism as measured by plasma and red blood cells Glutathione (GSH)
... Show MoreThe research has been concerned with the modalities of foreign trade payments (foreign trade financing), and made an accounting comparison between them to choose the best way to pay for the imported goods (payment of the real values of imported goods), given the importance of the impact of this activity on the national economy of all countries of the world, especially Iraq for the adoption of a very large amount of imported goods to meet the requirements of the people, which require the flow of huge amounts of foreign currency outside Iraq to pay for these goods, and therefore dealing incorrectly with it leads to the destruction of the national economy and the spread of a number of negative social and economic phenomena of
... Show MoreThe consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show MoreThe aim of this paper was to investigate the removal efficiencies of Zn+2 ions from wastewater by adsorption (using tobacco leaves) and forward osmosis (using cellulose triacetate (CTA) membrane). Various experimental parameters were investigated in adsorption experiment such as: effect of pH (3 - 7), contact time (0 - 220) min, solute concentration (10 - 100) mg/l, and adsorbent dose (0.2 - 5)g. Whereas for forward osmosis the operating parameters studied were: draw solution concentration (10 - 150) g/l, pH of feed solution (4 - 7), feed solution concentration (10 - 100) mg/l. The result showed that the removal efficiency by using adsorption was 70% and the removal efficiency by using forward osmosis was 96.2 %.
... Show More