Preferred Language
Articles
/
pBeCMo8BVTCNdQwCq2Al
The Most Common Characteristics of Fragile Video Watermarking
...Show More Authors

The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security  

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
The common bacterial pathogenes isolated from blood culture in paediatric patients
...Show More Authors

Fever is a common illness in the pediatric age group ,the causes could be viral ,bacterial and fungal , this study was focused on bacterial pathogens as gram positive like Staphylococci, coagulase positive or negative ,Streptococci and gram negative like E-coli , Klebsialla ,Proteus, Pseudomonas, Burkhoderia , Acinetobacter and others like Pusturella ,E-alkalescendiaper, Haemophillus influenza and yeast like candida . Four thousand and seventy eight blood samples (4078)were collected in a period between January 2011 and the end of May 2012 at the child welfare hospital ,all the samples were cultured on suitable culture media and then biochemical tests were done using API-E 20 and sugar fermentation tests ,sensitivity

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Political Sciences Journal
Pakistan: The most dangerous terrorist extremism hotbed (a study information, limitations, and factors)
...Show More Authors

   Receipt date:10/27/2021    accepted date:12/15/2021     Publication date:31/12/2021

        Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

The phenomenon of extremist extremism (terrorism) was one of the most prominent issues that took a large space in the twenty-first century, in which cognitive motives were mixed with strategic and ideological motives, leading to the emergence of terrorist extremi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Proceedings Of The 1st International Conference On Frontier Of Digital Technology Towards A Sustainable Society
The most ABO blood group susceptibility to COVID-19 infections in Baghdad city
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
The cluster analysis of most important citrus trees in some governorates of Iraq for the year 2019
...Show More Authors

Citrus fruits are one of the consumer agricultural products of the Iraqi citizen. It is rich in vitamins and usedin many food industries as well as medicines. Classifying the amount of production of citrus treesaccording to the producing governorates has been done to find a map that shows the production of citrustrees according to Iraqi governorates. A cluster analysis method was used according to the hierarchicalmethod. The results showed that Najaf and Qadisiyah are the most similar in citrus production, whileSaladin and Najaf were the two governorates with the furthest distance in proximity matrix. Diyalagovernorate was clustered in the first cluster within two, three, four or five of the clusters for classifyingIraqi governorates covere

... Show More
Scopus (2)
Scopus
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Horizontal Fragmentation for Most Frequency Frequent Pattern Growth Algorithm
...Show More Authors

Abstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.

View Publication Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Political Sciences Journal
Political pluralism between rejection and acceptance Astrobiological study of the most prominent contemporary Islamic trends
...Show More Authors

التعددية السياسية بين الرفلض والقبول دراسة نظرية لأبرز الاتجاهات الاسلامية المعاصرة

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Journal Of The College Of Languages (jcl)
The Characteristics of English Linking Adverbials
...Show More Authors

Linking adverbials are used to organize and bridge together extended stretches of discourse to make the text coherent. They are explicit indicators of the communicative function of the sentence and writers use them to let their readers follow what has already been said and to help them anticipate what is about to follow.
Linking adverbials include those relations of addition, enumeration, summation, apposition and so on. Through the use of these adverbials, the writer is able to organize and develop his ideas and help the reader follow him from one sentence to another. Thus, a linking adverbial is a semantic relation used to show the way in which what is to follow is systematically connected to what has gone before. So, they have anap

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Education For Women
Common Origin of Languages: A Comparative Study between the Holy Quran and the Heavenly Religions
...Show More Authors

This research is a new reading of some of the words in the Holy Quran, which is very old. It is a human reading in which religions are intertwined by recognizing the relationship between man and his fellow man in the unity of existence and the unity of the source of religions and the unity of language. The importance of this research in comparing some of the Arabic words has been contained among books believed by followers that it is from the one God Sunday.

When words are spoken in one way in the form of one creature, from the beginning of creation to the present day, this indicates the single origin of the languages..

The research tools were books of heavenly religions, the Quran, dictionaries and interpretations.

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Treasury bills to the most important monetary variables in Iraq for the period 1990 – 2013
...Show More Authors

The treasury bills one internal government debt instruments in iraq that were used to finance temporary deficits in the government budget, There fore the government resorted to issuing for the purpose of providing liquidity, As well as to invest in productive progects, After that it was financing the budget deficit by the monetary authovity of  the central baalpennek  [the new cash velease] which led to negative effects on the Iraqi econome, Thus we find that the treasury transfers have formed alarge proportion of the gross domestic government debt to finance the deficit ayear ago 2003.                      &nbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More