The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security
Linking adverbials are used to organize and bridge together extended stretches of discourse to make the text coherent. They are explicit indicators of the communicative function of the sentence and writers use them to let their readers follow what has already been said and to help them anticipate what is about to follow.
Linking adverbials include those relations of addition, enumeration, summation, apposition and so on. Through the use of these adverbials, the writer is able to organize and develop his ideas and help the reader follow him from one sentence to another. Thus, a linking adverbial is a semantic relation used to show the way in which what is to follow is systematically connected to what has gone before. So, they have anap
The research talks about the most important challenges facing Muslim youth of their ideological, social and economic types, and the youth is facing several problems, the most important of which are the intellectual and social invasion to which the Islamic nation has been exposed and ways to address them from a Quranic perspective and find solutions to these problems and these challenges in accordance with Islamic Sharia and the texts of the Holy Quran. From three topics and several demands, during which the researcher tried to find solutions to each challenge through the verses of the Noble Qur’an.
The research talks about the most important challenges facing Muslim youth of their ideological, social and economic types, and the youth is facing several problems, the most important of which are the intellectual and social invasion to which the Islamic nation has been exposed and ways to address them from a Quranic perspective and find solutions to these problems and these challenges in accordance with Islamic Sharia and the texts of the Holy Quran. From three topics and several demands, during which the researcher tried to find solutions to each challenge through the verses of the Noble Qur’an.
Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show MoreAbstract. Healthy skin is an important layer that gives appearance and self-confidence. The skin is affected by internal and external factors that surrounding the body. The problem of skin diseases is considered as one of the widespread diseases. The occurrence of these diseases varies from place to place depending on the nature of climate, the culture of the people, and their economic condition. A cross-sectional study of skin diseases was conducted at the dermatology centre for outpatient clinic of Baghdad hospital. The study is based on 7555 patients of all ages who are attended to this hospital in order to determine the prevalence of skin diseases. The study shows that the most prevalence skin diseases were infectious diseases with
... Show MoreA study carried out for study effect of furfural that extracted from corn cobs by using specialized reaction system laboratory on phytopathogenic fungi: Pythium aphanidermatum, Rhizoctonia solani, Macrophomina phaseolina and Fusarium solani in addition to biocontrol fungus Trichoderma viride were isolated from infected plants and from their rhizosphere . The preparation results of different concentrations from stock solution in concentration 1% of furflural showed that The concentration was 100 ppm of furfural was inhibited the growth of P. aphanidermatum46.7 % and the was in concentration 400 ppm. while the concentration 500 ppm caused inhibition 50% and 41.1% of R. solani and F. solani respectively. Whereas the concentration 500 pp
... Show MoreThe Video Assistant Referee (VAR) is a technology designed to review on- eld decisions through video footage in order to correct clear and critical refereeing errors. It enables the replay of key moments in slow motion to determine the correct naldecision,withcommunicationbetweenthevideoof cialsandtherefereeconductedviaheadset.Thesystem operates under the principle of "minimal interference, maximum bene t," intervening only in essential situations. This study aimedtoassessthecurrent implementationofVARintheIraqStarsFootballLeagueduringthe2023–2024season. To achieve this objective, the researchers employed a descriptive survey method involving a sample of 220 participants, including referees, coaches, players, assessors, academics, a
... Show MoreAn approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si
... Show More