The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security
From September 2002 to August 2003 monthly samples of fish were collected from two stations at the area of study. The results of the present study showed that the sex-ratio (male: female) was 1:0.95. Sexual maturity was reached by all fishes above 28 cm in total length , the smallest mature male was 21.3 cm in total length and body weight 164 gm. While the smallest mature female was 21.5 cm in T.L. and body weight 155 gm. The mature male and female were in the second year of their ages. The breeding season extended from the end of February until the end of June and another season started from Se
... Show MoreThis study was conducted to evaluate the efficiency of some chemicals and biological agents to induce systemic resistance (ISR) against to wheat common bunt disease caused by the two species of fungus Tilletia tritici (Bjerk.) Wint (T. caries (Dac.) Tul.) and T. laevis Kuhn (T. foetida (Wall.) Liro. Trails in the efforts to find an alternative, safe and environmentally friendly means to control the disease. Results of this study which carried out during two consecutive seasons for the years 2012 - 2013 and 2013 - 2014 at two different environmental locations. Seed treatment by (SA 100 and 200 mg/L, 500 ?–aminobutyric acid (BABA) and 1000 mg/L, Effective Microorganisms (EM1) 40 and 150 ml/kg seeds) have led to high significant redu
... Show MoreFilled the place thought philosophers and ancient is the identity that you know The value of belonging to a World Geography existential - the spiritual , and Which is characterized by the structure humanity from one another and the Rest of the organisms they interact with him alone by environmental Conditions - surrounding has to achieve time through continuous movement Localized or comprehensive . The place is exemplified by making special Natural Great Creator, I believe making structure humanity combined - Individual interactive because of its influential role in all daily consumer Productions and creative arts, specifically drama's TV , because the place in Aesthetic discourse - TV drama directly affect the creating and building the
... Show MoreThe aerodynamic characteristics of general three-dimensional rectangular wings are considered using non-linear interaction between two-dimensional viscous-inviscid panel method and vortex ring method. The potential flow of a two-dimensional airfoil by the pioneering Hess & Smith method was used with viscous laminar, transition and turbulent boundary layer to solve flow about complex configuration of airfoils including stalling effect. Viterna method was used to extend the aerodynamic characteristics of the specified airfoil to high angles of attacks. A modified vortex ring method was used to find the circulation values along span wise direction of the wing and then interacted with sectional circulation obtained by Kutta-Joukowsky the
... Show MoreThe aim of the current study is to demonstrate the effect of honey on the sperms characteristics (sperm concentration, sperm motility, grade of activity and sperm normal morphology) as well as pregnancy rate in mice. Sperms were obtained from caudal epididymis of male mice and prepared by adding10% of honey to the IVF medium using direct sperms activation technique for 30 minute incubation period before artificial insemination.
The study revealed a significant (P > 0.05) increase in active sperm motility (grade A and grade B) 49% and pregnancy rate 53.3% in female mice artificially inseminated with sperms. On the other hand, there were no significant differences in sperm con
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreA two-dimensional computational study had been performed regarding aerodynamic forces and pressures affecting a cambered inverted airfoil, CLARK-Y smoothed with ground effects by solving the Reynolds-averaged Navier-Stokes equations, using the commercial software COMSOL Multiphysics 5.0 solver. Turbulence effects are modeled using the Menter shear-stress transport (SST) two-equation model. The negative lift (down-force), drag forces and pressures surface were predicted through the simulation of wings over inverted wings in different parameters namely; varying incidences i.e. angles of attack of the airfoils, varying the ride hide from the ground covering various force regions, two-dimensional cross-section of the inverted front wings to be
... Show MoreA number of pulsed experiments have been carried out using a high-voltage circuit containing R,L, and C in certain arrangements. A spherical spark gap of steel electrodes was used as a high-current switch operated by a voltage of up to 8kV and triggered in both self-triggering and third-electrode triggering modes. Current measurements were carried out by using both current-viewing resistor and Rogowski coils designed for this purpose. Typical current waveforms have shown obvious dominating inductance effect of the circuit components in an underdamped oscillation. The behavior of the circuit impedance was studied by recording both pulsed current peaks and the charging voltages when currents of up to 2.5kA were recorded. The dur
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreBackground: Osteogenesis imperfecta (OI) is a rare congenital condition that results in bone fragility, recurrent fractures, and various extra-skeletal manifestations. Currently, intravenous bisphosphonate is the mainstay of medical treatment in OI. Objective: To identify the effect of current management strategies on Iraqi children diagnosed with OI. Methods: A retrospective study enrolled OI patients who were registered in Central Child Teaching Hospital, Baghdad, Iraq, from January 2015 to December 2022. We enrolled confirmed OI cases (either clinically and/or radiologically) who received cyclic pamidronate therapy for at least 3 cycles. They neither received other types of bisphosphonates nor underwent surgical intervention. Res
... Show More