Preferred Language
Articles
/
oRd_Mo8BVTCNdQwClGC7
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking types in the same system reaches better results and increases the power of the system and makes it robust against any attack and revel the modification if any at the same time. PSNR has been used as a performance metric to evaluate the study. The result of the new proposed watermark is 54. It is preferable to utilize both a fragile and a robust watermark simultaneously. Index Terms— Robust Watermarking, Fragile Watermarking, Embedded Value, Imperceptibility, Security.

Scopus Crossref
View Publication
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Female education in Iraq 1921-1958 - A historical Study-
...Show More Authors

In spite of the foundation of Iraqi state in 1921 and the formation of the new features of
the modern state, however, the inherited costumes and traditions sustained in the conservative
society. But due to the development that inflicted to the Iraqi society and the development of
the staff in all fields and requirement conducting to female learning. After WW II and the
1950s, women get out of their houses to seek learning by approaching the doors.
What is positive about that phase was the formation of the College of Queen A'liya
which is regarded as a positive indicator. In any case the Iraqi family encouraged women to
be indulged in higher education. Calling the college Queen A'liya

View Publication Preview PDF
Publication Date
Sat Apr 24 2021
Journal Name
Turkish Journal Of Computer And Mathematics Education (turcomat)
A Linguistic Study of Epitaphs in Selected English Texts
...Show More Authors

This research aims at analysing epitaphs written by Thomas Moore for the memory of Rupert Southey, the epitaph is analysed linguistically and stylistically on four levels graphology, phonology, morphology, and lexico-syntax level to explore the elements that the writer uses the most at each level. Bearing in mind Nowottny approach (1962) (to text analysis) who believes that the linguistic analysis of a literary text is not just a marginal but a necessity” (Bakuuro etal., 2018:34). The researcher has selected and analysed a written epitaph of famous individual associated with English, literature. The study involves both literary and linguistic analysis, with much more concentration through the analysis on the aspect of linguistics. In fact

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
Bulletin Of The Australian Mathematical Society
A DYNAMICAL STUDY OF SALINE PLUMES IN DESALINATION OUTFALLS
...Show More Authors

View Publication
Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Photovoltaic system DC series arc fault: a case study
...Show More Authors

<p>Photovoltaic (PV) systems are becoming increasingly popular; however, arc faults on the direct current (DC) side are becoming more widespread as a result of the effects of aging as well as the trend toward higher DC voltage levels, posing severe risk to human safety and system stability. The parallel arc faults present higher level of current as compared with the series arc faults, making it more difficult to spot the series arc. In this paper and for the aim of condition monitoring, the features of a DC series arc fault are analyzed by analysing the arc features, performing model’s simulation in PSCAD, and carrying out experimental studies. Various arc models are simulated and investigated; for low current arcs, the heur

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
The Fourth International Conference Of Linguistic Studies
A pragmatic study of refusals among Iraqi EFL learners
...Show More Authors

The speech act of refusals has been studied widely either alone or in relation to such areas as apology, requests, promotion, and invitation. The present study aims to investigate the strategies employed by Iraqi females in refusing marriage proposals. It attempts to explore their preferences to respond directly or indirectly in relation to their ages and educational background of the parents. The sample of the study consists of 25 participants; they are learners of English as a foreign language (EFL) at the College of Education for Women/ University of Baghdad. The data are collected by using a discourse completion task (DCT) followed by a follow up interview. The researchers used a Google form shared via emails to get responses from the p

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Application of Groebner Bases to Study a Communication System
...Show More Authors

This paper introduces a relationship between the independence of polynomials associated with the links of the network, and the Jacobian determinant of these polynomials. Also, it presents a way to simplify a given communication network through an algorithm that splits the network into subnets and reintegrates them into a network that is a general representation or model of the studied network. This model is also represented through a combination of polynomial equations and uses Groebner bases to reach a new simplified network equivalent to the given network, which may make studying the ability to solve the problem of network coding less expensive and much easier.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
A study of fermi hole for some atomic systems
...Show More Authors

the electron correlation effect for inter-shell can be described by evaluating the fermi hole and partial fermi hole for Li atom comparing with Be+ and B+2 ions

View Publication Preview PDF
Publication Date
Fri Feb 02 2024
Journal Name
Kurdish Studies
A Linguistic Study of Metaphorical Expressions in Political Interviews
...Show More Authors

In recent years, the linguo-philosophical studies of metaphor have tended to define metaphor as an interaction of the object, that is the referent of conceptualization and some features that are associated with sensual manner realities, whose name is used when resolving the conceptual problem-nominative situation, namely the situation of the formation of a new concept and its verbalization. The objective of this term paper lies in the phenomenon of metaphors used in modern political discourse. In our understanding a metaphor is not only of a linguistic nature, but also political. This paper approaches the subject of conceptual metaphor and political argumentation through the prism of synergies of the political topic, affirmative or negative

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 01 2022
Journal Name
مجلة الأستاذ للعلوم الإنسانية والاجتماعية
Impoliteness in Some American Presidential Debates: A Pragmatic Study
...Show More Authors

The current research is concerned with a pragmatic study of attack and defense acts that are used by President Donald Trump in the American Presidential Debate in 2020. Attack is an attempt to harm or defeat someone, and it is a bold message that the speaker or attacker does not like or disagree with the other antagonist. On the contrary, defense means a person responds to an attack of his or her opponent. After an attack, the politician either negates or fact-checks claims made by his opponents or tries to set the record straight. By the end of the study, it is expected to answer the following questions: What are the most frequent strategies of attack and defense that utilized by President Trump to formulate his speech? What are the reason

... Show More
Preview PDF
Publication Date
Mon Apr 02 2018
Journal Name
University Of Baghdad, College Of Education For Pure Sciences / Ibn Al-haitham, Department Of Mathematics
A Study of Some Generalizations of Fibrewise Bitopological Spaces
...Show More Authors

In this research, we introduce and study the concept of fibrewise bitopological spaces. We generalize some fundamental results from fibrewise topology into fibrewise bitopological space. We also introduce the concepts of fibrewise closed bitopological spaces,(resp., open, locally sliceable and locally sectionable). We state and prove several propositions concerning with these concepts. On the other hand, we extend separation axioms of ordinary bitopology into fibrewise setting. The separation axioms we extend are called fibrewise pairwise T_0 spaces, fibrewise pairwise T_1 spaces, fibrewise pairwise R_0 spaces, fibrewise pairwise Hausdorff spaces, fibrewise pairwise functionally Hausdorff spaces, fibrewise pairwise regular spaces, fibrewise

... Show More