The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security
A number of pulsed experiments have been carried out using a high-voltage circuit containing R,L, and C in certain arrangements. A spherical spark gap of steel electrodes was used as a high-current switch operated by a voltage of up to 8kV and triggered in both self-triggering and third-electrode triggering modes. Current measurements were carried out by using both current-viewing resistor and Rogowski coils designed for this purpose. Typical current waveforms have shown obvious dominating inductance effect of the circuit components in an underdamped oscillation. The behavior of the circuit impedance was studied by recording both pulsed current peaks and the charging voltages when currents of up to 2.5kA were recorded. The dur
... Show MoreA two-dimensional computational study had been performed regarding aerodynamic forces and pressures affecting a cambered inverted airfoil, CLARK-Y smoothed with ground effects by solving the Reynolds-averaged Navier-Stokes equations, using the commercial software COMSOL Multiphysics 5.0 solver. Turbulence effects are modeled using the Menter shear-stress transport (SST) two-equation model. The negative lift (down-force), drag forces and pressures surface were predicted through the simulation of wings over inverted wings in different parameters namely; varying incidences i.e. angles of attack of the airfoils, varying the ride hide from the ground covering various force regions, two-dimensional cross-section of the inverted front wings to be
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show Morewind load coefficient
This paper studies the main characteristics of the traditional urban configuration of Arab cities, as an important built heritage, discussing the approach adopted with such configuration at the local level, and examines its ability to preserve the character of the city, as well as, its responsiveness to the recent requirements of its society that constantly change; in order to reach the appropriate procedures to deal with the traditional urban configuration of the Iraqi city to achieve a vital cultural communication with the vernacular built heritage, by dealing with the Form-Moral Values structure. Due to its importance within other traditional Iraqi cities, the research chose Al-Kadhimiya as a case study, so it discusses and compares
... Show MoreThe study was conducted out at the Ministry of Agriculture's Poultry Research Station/Animal ResourcesDepartment/Agricultural Research Center. To see how body weight (BW) and leptin hormone (LEP) levels inbreeder blood affect fertility and hatchability. 140 Iraqi local laying chickens (120 females + 20 males) aged 28weeks were used in the study. Following the numbering of The experiment was divided into three periods,each lasting 28 days, during which the breeder's live body weight was recorded and divided into two categories(greater than 1.5 kg and less than 1.5 kg), and blood samples were collected at the end of each period todetermine the concentration of leptin hormone in the breeders' blood. For comparison between mothers'performance,
... Show MoreAbstract:
Musa son of Yaqoob son of Izra, the Spanish poet, linguist, and philosopher, was born in Granada. He has many poems representing types of poetry. Also, he had important books, such as "the Poetry of Israel" and "Contemplative Research". He is knowledgeable in both Hebrew and Arabic, because most of his books were written in Arabic and the then translated to Hebrew. It seemed that he was influenced by Arab poets, specifically Abo Firas, and borrowed many issues, such as comparison, repetition, exaggeration, etc. and included them in his poetry.
All know that Arabic literature clearly influenced Hebrew literature in the Spanish era. Ara
... Show MoreABSTRACT: Polypyrrole and polypyrrole / silver nanocomposites were fabricated by in-situ polymerization employing Ammonium Persulphate as an oxidizing agent. Nanocomposites were synthesized by combining polypyrrole and silver nanoparticles in various weight percentages (0.1%, 0.5%, 3%, 5% and 7% wt.). Crystallographic data were collected using X-ray diffraction. PPy particles were found to have an orthorhombic symmetry. In contrast, PPy/Ag nanocomposites were reported to have monoclinic structure. The crystallite size was determined by XRD using Scherrer equation and considered to be within 49 nm range. DC conductivity of pelletized samples was evaluated in the temperature range of 323.15k to 453.15k. The conductiv
... Show MoreGurney flap (GF) is well-known as one of the most attractive plain flaps because of the simple configuration and effectiveness in improving the lift of the airfoil. Many studies were conducted, but the effects of GF on the various airfoil types need to be further investigated. This study aimed to clarify the effect of GF in the case of the supercritical airfoil RAE2822. This research includes a steady, two-dimensional computational investigation carried out on the supercritical airfoil type RAE-2822 to analyze Gurney flap (GF) effects on the aerodynamic characteristics of this type of airfoil utilizing the Spalart-Allmaras turbulence model within the commercial software Fluent. The airfoil with the Gurney flap was analyz
... Show More