Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking types in the same system reaches better results and increases the power of the system and makes it robust against any attack and revel the modification if any at the same time. PSNR has been used as a performance metric to evaluate the study. The result of the new proposed watermark is 54. It is preferable to utilize both a fragile and a robust watermark simultaneously. Index Terms— Robust Watermarking, Fragile Watermarking, Embedded Value, Imperceptibility, Security.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreUnter dem Titel " Technische Methoden im Fremdsprachunterricht als eine neueste Methode im Fremdsprachlernen, die Spiele als Muster"
versteht man, dass die Forschung sich mit einer neuen Methoden im Fremdsprachunterricht beschäftigt. Von den neuen Methoden im Unterricht sind die Spiele. So man sieht in den letzten Jahren viele Artikel zum Thema Spiele im Fremdsprschunterricht. Davon gehen wir aus, dass die Spiele im Unterricht eine groβe Rolle spielt, denn diese Methode macht Lust, Spaβ im Lernenprozeβ. Die Spiele im Unterricht bezeichnen als ein Mittel, um Unterricht etwas Schönes , Nützliches und Lebendigs zu sein. Die Spiele sind vielfälltig und unterscheidet sich nach den Themen und Materialien. In dieser F
... Show MoreAbstract Background: Kaposi’s sarcoma (KS) is an angioproliferative neoplastic disorder that occurs in different epidemiological forms. Human Herpesvirus type 8 (HHV-8) is established as a causative agent of KS that has been mentioned in textbooks and literature. In the last two decades, KS cases were up searched through many Iraqi medical researches which have been published, but unfortunately, none of which had confirmed this association. Objectives: To assess the association of latent nuclear antigen-1(LANA-1) of HHV-8 among KS patients with clinicopathological parameters and to evaluate if this procedure is valuable for diagnosing this disease through the first immunohistochemical study in Iraq. Methods: This is a clinico-immunohis
... Show MoreIn recent years, the need for Machine Translation (MT) has grown, especially for translating legal contracts between languages like Arabic and English. This study primarily investigates whether Google Translator can adequately replace human translation for legal documents. Utilizing a widely popular free web-based tool, Google Translate, the research method involved translating six segments from various legal contracts into Arabic and assessing the translations for lexical and syntactic accuracy. The findings show that although Google Translate can quickly produce English-Arabic translations, it falls short compared to professional translators, especially with complex legal terms and syntax. Errors can be categorized into: polysemy,
... Show MoreThe last decade of this 20th century provides a wide spread of applications of one of the computer techniques, which is called Fuzzy Logic. This technique depends mainly on the fuzzy set theory, which is considered as a general domain with respect to the conventional set theory. This paper presents in initiative the fuzzy sets theory and fuzzy logic as a complete mathematics system. Here it was explained the concept of fuzzy set and defined the operations of fuzzy logic. It contains eleven operations beside the other operations which related to fuzzy algebra. Such search is considered as an enhancement for supporting the others waiting search activities in this field.
Security reflects a permanent and complex movement that complies with international and societal needs and developments in all its dimensions, interactions and levels. To constitute a universal demand for all States, communities and individuals. The question of security is one of the most important motivations and motivations that govern the behavior, and even the objectives of those societies and States. These groups or individuals have always sought to avoid fear and harm, and to provide stability, safety and security. In the light of this, security studies have been among the important fields of study in the field of international and strategic relations. The field witnessed many theoretical efforts, from the traditional perspective,
... Show MoreThis search include the synthesis of some new 1,3-oxazepine derivatives have been prepared, starting from reaction of L-ascorbic acid with dry acetone in presence of dry hydrogen chloride afforded the acetal (I). Treatment of the latter with p-nitrobenzoyl chloride in pyridine yielded the ester (II) which was dissolved in (65%) acetic acid in absolute ethanol yielded the glycol (III). The reaction of the glycol (III) with sodium periodate in distilled water at room temperature produced the aldehyde (IV). The compound (V) [4-(1,3-dioxoisoindolin-2-yl)benzoic acid] was synthesized by reaction p-aminobenzoic acid and phthalic anhydride in presence of (gla. CH3COOH). Reaction of compound (V) with thionyl chloride produced [4-(1,3-dioxoisoindoli
... Show More