Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking types in the same system reaches better results and increases the power of the system and makes it robust against any attack and revel the modification if any at the same time. PSNR has been used as a performance metric to evaluate the study. The result of the new proposed watermark is 54. It is preferable to utilize both a fragile and a robust watermark simultaneously. Index Terms— Robust Watermarking, Fragile Watermarking, Embedded Value, Imperceptibility, Security.
A new approach for baud time (or baud rate) estimation of a random binary signal is presented. This approach utilizes the spectrum of the signal after nonlinear processing in a way that the estimation error can be reduced by simply increasing the number of the processed samples instead of increasing the sampling rate. The spectrum of the new signal is shown to give an accurate estimate about the baud time when there is no apriory information or any restricting preassumptions. The performance of the estimator for random binary square waves perturbed by white Gaussian noise and ISI is evaluated and compared with that of the conventional estimator of the zero crossing detector.
11-22 Description An apology may be defined as “the act of declaring one’s regret, remorse or sorrow for having insulted, failed, injured, harmed or wronged another (Internet Encyclopedia of Philosophy IEP). A definition quite interested in the function suggests that “an apology is a speech act addressed to B’s face–needs and intended to remedy an offence for which A. takes responsibility.”(Holmes, 1990: 159). Apologies are also" speech acts" that are hard to identify, define or categorize, a difficulty that arises directly out of the functions they perform (Lakoff, 2001: 201) and the forms they take. In function, they range from selfabasement for wrongdoing to the formal display of appropriate feeling. In form, they range from
... Show MoreThe paper presents a highly accurate power flow solution, reducing the possibility of ending at local minima, by using Real-Coded Genetic Algorithm (RCGA) with system reduction and restoration. The proposed method (RCGA) is modified to reduce the total computing time by reducing the system in size to that of the generator buses, which, for any realistic system, will be smaller in number, and the load buses are eliminated. Then solving the power flow problem for the generator buses only by real-coded GA to calculate the voltage phase angles, whereas the voltage magnitudes are specified resulted in reduced computation time for the solution. Then the system is restored by calculating the voltages of the load buses in terms
... Show MoreCD40 is a type 1 transmembrane protein composed of 277 amino acids, and it belongs to the tumor necrosis factor receptor (TNFR) superfamily. It is expressed in a variety of cell types, including normal B cells, macrophages, dendritic cells, and endothelial cells, as a costimulatory molecule. This study aims to summarize the CD40 polymorphism effect and its susceptibility to immune-related disorders. The CD40 gene polymorphisms showed a significant association with different immune-related disorders and act as a risk factor for increased susceptibility to these diseases.
The present study aims to explore the effectiveness of a proposed study unit based on the funds of knowledge theory in developing the attitudes towards cultural identity and the proposed study unit. In order to achieve the goal of the study, the two researchers followed the quasi-experimental approach, where the study sample consisted of (28) female students of the fifth-grade at Al-Jeelah Basic Education School, Al-Dakhiliyah Governorate in the Sultanate of Oman. The data were collected by two scales: the first is a scale of attitudes towards cultural identity consisting of (26) items. The second was a scale of attitudes towards the proposed study unit, which consisted of (24) items. The results of the study revealed that the effect of
... Show MoreThe aim of this paper is to design suitable neural network (ANN) as an alternative accurate tool to evaluate concentration of Copper in contaminated soils. First, sixteen (4x4) soil samples were harvested from a phytoremediated contaminated site located in Baghdad city in Iraq. Second, a series of measurements were performed on the soil samples. Third, design an ANN and its performance was evaluated using a test data set and then applied to estimate the concentration of Copper. The performance of the ANN technique was compared with the traditional laboratory inspecting using the training and test data sets. The results of this study show that the ANN technique trained on experimental measurements can be successfully applied to the rapid est
... Show MoreIn order to take measures in controlling soil erosion it is required to estimate soil loss over area of interest. Soil loss due to soil erosion can be estimated using predictive models such as Universal Soil Loss Equation (USLE). The accuracy of these models depends on parameters that are used in equations. One of the most important parameters in equations used in both of models is (C) factor that represents effects of vegetation and other land covers. Estimating land cover by interpretation of remote sensing imagery involves Normalized Difference Vegetation Index (NDVI), an indicator that shows vegetation cover. The aim of this study is estimate (C) factor values for Part of Baghdad city using NDVI derived from satellite Image of Landsat-7
... Show MoreAn optical video communication system is designed and constructed using pulse frequency modulation (PFM) technique. In this work PFM pulses are generated at the transmitter using voltage control oscillator (VCO) of width 50 ns for each pulse. Double frequency, equal width and narrow pulses are produced in the receiver be for demodulation. The use of the frequency doubling technique in such a system results in a narrow transmission bandwidth (25 ns) and high receiver sensitivity.
Over the last few decades, many instructors have been trying all kinds of teaching methods, but without benefit. Nevertheless, in the 1986, a new technique is appeared which called K-W-L technique, it is specified for reading comprehension passages because reading skill is not easy matter for students for specific purposes (ESP).therefore, the K-W-L technique is a good one for thinking and experiences. To fulfill the aims and verify the hypothesis which reads as follows" it is hypothesized that there are no significant differences between the achievements of students who are taught according to K-W-L technique and those who are taught according to the traditional method
... Show More