Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking types in the same system reaches better results and increases the power of the system and makes it robust against any attack and revel the modification if any at the same time. PSNR has been used as a performance metric to evaluate the study. The result of the new proposed watermark is 54. It is preferable to utilize both a fragile and a robust watermark simultaneously. Index Terms— Robust Watermarking, Fragile Watermarking, Embedded Value, Imperceptibility, Security.
Compression study of Irisin, Vitamin D and Kidney Function Parameters Between Iraqi Fracture Patients with and Without DM2 and Healthy Control, Omar Yousif Majnun*, Altaie AF
This paper aims at presenting a comparison between objective and subjective tests . This paper attemptsto shed light on these two aspects of tests and make do a compression by using suitable techniques for objective and subjective tests .
The paper compares between the two techniques used by the objective and subjective tests respectively, the time and efforts required by each type, the extent to which each type can be reliable, and the skills each type is suitable to measure.
The paper shows that objective tests, on the contrary of the subjective ones, encourages guess> Objective tests are used to test specific areas of langua
... Show MoreBackground: White-spot lesion is one of the problems associated with the fixed orthodontic treatment. The aims of this in-vitro study were to investigate enamel damage depth on adhesive removal when the adhesive were surrounded by sound, demineralized or demineralized enamel that had been re-mineralized prior to adhesive removal using 10% Nano-Hydroxy apatite and to determine the effect of three different adhesive removal techniques. Materials and methods: Composite resin adhesive (3M Unitek) was bonded to 60 human upper premolars teeth which were randomly divided in to three groups each containing ten sound teeth and ten teeth with demineralized and re-mineralized lesions adjacent to the adhesive. A window of 2 mm was prepared on the bucca
... Show MorePurpose: This study aimed to compare the stability and marginal bone loss of implants inserted with flapped and flapless approaches 8 weeks after surgery and 3 months after loading. Material and Methods: Thirty SLActive implants were inserted in 11 patients and early loaded with final restoration 8 weeks after healing period. The stability values determined by Osstell and the marginal bone loss measured by CBCT at the initial time (1st) and 8 weeks of the healing period (2nd) and 3 months after loading (3rd). Results: The overall survival rate was 100%. A significant increase in the 3rd implant stability value in the age of ˂ 40. A significant decrease in the 2nd implant stability value in both gender and traumatic zone with a flapless app
... Show MoreBackground: Irrigation has a central role in endodontic treatment. Several irrigating solutions have the antimicrobial activity and actively kill bacteria and yeasts when introduced in direct contact with the microorganisms. The purpose of this study was to evaluate the antimicrobial effectiveness of Dandelion (Taraxacum officinale) root and leaf extracts as possible irrigant solutions, used during endodontic treatments, and both were compared to Sodium hypochlorite, Propolis and Ethyl alcohol. Materials and Method: Forty seven human extracted single rooted teeth were selected. The teeth were decoronated using a diamond disk to have a length of 15 mm ±1 mm and they were instrumented using the hybrid technique. All roots were sterilized
... Show MoreThis study aims to reveal the semiotic of “March of Return” cartoon in the Palestinian journalism, topics, Symbols and semantics that were covered.
This study is descriptive. It uses the survey method. Content analysis, and methodological comparison was also used.
The researcher chose an intentional sample of Palestine and Al-Hayat Al-Jadida newspapers for one year from March 30, 2018 to March 31, 2019, through a comprehensive inventory of all cartoons of the return marches during this period, which amounted to 59 cartoons.
The study has reached the following findings:
Newspapers cartoons focused on the topics of durability of the protester
... Show MoreDespite the global economic downturn, online e-commerce, especially the sale of counterfeit goods, continues to witness a rise in sales, and one of the important players in e-commerce is the owners of e-commerce auction sites. Although they do not have a direct role in trademark infringement, they still consider them indirectly responsible (secondary liability) for infringing on their trademarks. Thus, many cases have been filed by the owners of the original trademarks (which have been infringed by persons who have sold some of the goods and products that are imitating their marks through some electronic auctions) against the owners of those auctions. In view of the international character of the Internet, in different countries, and despit
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
Number of new polyester and polyamide are prepared as derivatives from 5,5`-(1,4-phenylene)-bis-(1,3,4-thiadiazole-2-amine) [C1], three series of heterocyclic compounds were synthesized.The first series includes the Schiff base [C2] prepared from the reaction between compound [C1] with p-hydroxy benzaldehyde in presence of acetic acid and absolute ethanol , then these derivatives have reaction with maleic anhydride , phthalic anhydride and sodium azide, respectively to obtain the compounds [C3-5] contaning (oxazepine and tetrazole) rings.The third series of compounds [C1-5] has transformed to their polymers [C6-15] by reaction with adipoyl chloride and glutroyl chloride , respectively. The reaction was followed by T.L.C and ident
... Show More