The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security
Aphid Aphis spp (Hemiptera:Aphididae) and Thrips Thrips spp (Thysanoptera: Thripidae) an economically important pests on several crops in the world and Iraq, that transfer many viruses diseases to it. Field studies were conducted to assessment the population density of these insects and susceptibility of six varieties (Barin, Revera, Divela, Rudlph, Alazata and Pleny) to infestation during 2013 spring season. The results were showed that all Potato varieties were infested by Aphis and Thrips on spring plantation but with different percentage. The Divela variety was higher percentage of infestation and high population density of aphid which averaged 1.47 insect/ leaf while in Alazata was the lower population density which averaged 1.02 in
... Show MoreIn this work, we synthesized thirteen compounds of 1-(2-furoyl)thiourea derivatives 1-13 by conversion of 2-furoyl chloride to 2-furoyl isothiocyanate by reacting it with potassium thiocyanate in dry acetone in a quite short reflux time then, in the same pot, different of (primary and secondary amines) were added individually to achieve thiourea derivatives. The products were characterized spectroscopically using (FT-IR, 1H NMR and 13C NMR) techniques. Some of them were evaluated as antioxidant agents using DPPH radical scavenging method, and all were examined theoretically as enzyme inhibitors against Bacillus pasteurii urease (pdb id: 4ubp) and by studying molecular docking using Autodock (4.2.6) software.
This study comes as: The responsibility of the Iraqi newspapers in promoting the political culture inside society, an analytical study in newspapers: Al-Sabah, Al-Ittihad, Al-Aalam for 2/ 3/ 2013 to 31/ 3/ 2013 to spot light on the extent to which the three mentioned newspapers are compliance with the promotion of the political culture inside society which is seen as one of the essential requirements for the success and promotion of the democratic process inside society.
The study aims to: finding out the extent to which these newspapers are compliance with their responsibility in the promoting the political culture inside society; knowing the nature of their role in pr
... Show MoreThe importance of the Arabic language and its deep vocabulary in the live translation of the work of science and interior design can't be hidden from the whole world. The previous studies have dealt with the role of the linguistic vocabulary and Arabic calligraphy in interior spaces in terms of decoration and design. However, this research sheds light on the importance of linguistic vocabulary in the construction of design thought and how it has become the a basic motivation in the process of scientific and practical construction and not just aesthetic formations that took their place in the interior spaces, as linguistic vocabulary emerged recently and echoed within the specialization of interior design and formed a key motive to explor
... Show MoreThis research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen
The transfer function model the basic concepts in the time series. This model is used in the case of multivariate time series. As for the design of this model, it depends on the available data in the time series and other information in the series so when the representation of the transfer function model depends on the representation of the data In this research, the transfer function has been estimated using the style nonparametric represented in two method local linear regression and cubic smoothing spline method The method of semi-parametric represented use semiparametric single index model, With four proposals, , That the goal of this research is comparing the capabilities of the above mentioned m
... Show MoreThe researcher is one of the workers in university sports student activities, as he noticed that there is a diversity in the use of leadership patterns among managers of student activities in Iraqi universities between one director and another, which leads to the impact of these leadership styles on performance, positive or negative, in the level of human relations and the achievement of results. The researcher adopted the descriptive method in the survey method with relational relationships. The research sample consisted of (184) sports coaches who represent (27) universities and governmental and private colleges. To achieve the research objectives, the researcher used the Statistical Package for Social Sciences (Spss). To extract.statisti
... Show MoreThe techniques of fractional calculus are applied successfully in many branches of science and engineering, one of the techniques is the Elzaki Adomian decomposition method (EADM), which researchers did not study with the fractional derivative of Caputo Fabrizio. This work aims to study the Elzaki Adomian decomposition method (EADM) to solve fractional differential equations with the Caputo-Fabrizio derivative. We presented the algorithm of this method with the CF operator and discussed its convergence by using the method of the Cauchy series then, the method has applied to solve Burger, heat-like, and, couped Burger equations with the Caputo -Fabrizio operator. To conclude the method was convergent and effective for solving this type of
... Show More