The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security
Due to the great losses caused by weeds to the crop, it is necessary to continue testing new herbicides that may be more efficient than the herbicides used that can reduce competition between weeds and crops, Therefore, a field experiment was carried out in the experimental field of the Department of Field Crops, College of Agricultural Engineering Sciences, University of Baghdad (Al-Jadriya) during the winter season of 2021-22 in order to evaluate the efficiency of the herbicide H-199 and compare it with some herbicides used in controlling companion weed to three cultivars of wheat and its effect in the yield and its components. The experiment was applied according to the randomized complete block design with split-plot arrangement
... Show MoreBackground: Ultrasound guided core needle biopsy is becoming a gold standard in the work up of suspicious breast lesion. In Iraq, radiologists are not taking the lead in core needle biopsy performance.
Objectives: To evaluate the radiologist performance of core needle biopsy highlighting the precession and accuracy of the procedure, the concordance of ultrasound and histopathology, and identifying challenges facing the radiologist during the procedure.
Subjects and Methods: A prospective study involving a total of 50 patients with ultrasound (US) BIRADS IV or V. Ultrasound guided core needle biopsy was performed for each patient. Surgical pathol
... Show MoreIn this research, some robust non-parametric methods were used to estimate the semi-parametric regression model, and then these methods were compared using the MSE comparison criterion, different sample sizes, levels of variance, pollution rates, and three different models were used. These methods are S-LLS S-Estimation -local smoothing, (M-LLS)M- Estimation -local smoothing, (S-NW) S-Estimation-NadaryaWatson Smoothing, and (M-NW) M-Estimation-Nadarya-Watson Smoothing.
The results in the first model proved that the (S-LLS) method was the best in the case of large sample sizes, and small sample sizes showed that the
... Show MoreThis paper proposes a new approach, of Clustering Ultrasound images using the Hybrid Filter (CUHF) to determine the gender of the fetus in the early stages. The possible advantage of CUHF, a better result can be achieved when fuzzy c-mean FCM returns incorrect clusters. The proposed approach is conducted in two steps. Firstly, a preprocessing step to decrease the noise presented in ultrasound images by applying the filters: Local Binary Pattern (LBP), median, median and discrete wavelet (DWT),(median, DWT & LBP) and (median & Laplacian) ML. Secondly, implementing Fuzzy C-Mean (FCM) for clustering the resulted images from the first step. Amongst those filters, Median & Laplace has recorded a better accuracy. Our experimental evaluation on re
... Show MoreSpent catalysts for sulfuric acid production have large amount of vanadium and due to environmental authority it is required to reduce the vanadium contain of the spent catalyst. Experimental investigation was conducted to study the vanadium recovery from spent catalyst via leaching process using sodium hydroxide to study the effect of process variables (temperatures, sodium hydroxide molarities, leaching time and particle size) on vanadium recovery. The effect of process variables (temperature, particle size,molarities of sodium hydroxide and leaching time) on the percentages of vanadium recovery were investigated and discussed .It was found that the percentage of vanadium recovery increased with increasing temperature up to 100 , incre
... Show MoreTransforming the common normal distribution through the generated Kummer Beta model to the Kummer Beta Generalized Normal Distribution (KBGND) had been achieved. Then, estimating the distribution parameters and hazard function using the MLE method, and improving these estimations by employing the genetic algorithm. Simulation is used by assuming a number of models and different sample sizes. The main finding was that the common maximum likelihood (MLE) method is the best in estimating the parameters of the Kummer Beta Generalized Normal Distribution (KBGND) compared to the common maximum likelihood according to Mean Squares Error (MSE) and Mean squares Error Integral (IMSE) criteria in estimating the hazard function. While the pr
... Show More
After the defeat of the military terrorist organization "ISIS" and the fall of the throne of its alleged state in the Iraqi city of Nineveh, in Syrian Baghouz, and the end of its control over the land, the Syrian camps, especially "Al-Hol" camp, emerge as an incubator for the ideology of the terrorist organization "ISIS" and a vital base for its consolidation and dissemination, which includes (68,000- 73,000) people. During the years following the military defeat of (ISIS), the camp witnesses the spread of extremist ideas widely at the hands of its residents, including the families of the organizations dead's, extremist detainees, and those who deal with it, taking advantage of the deterioration of the environmental, se
... Show MoreAbstract:
The aim of this research is to highlight the importance of achieving customer satisfaction by using information technology and Internet networks in the process of purchasing flight tickets, and switching from the traditional method of purchasing and payment operations to the electronic method, to reduce the financial and non-financial risks associated with the traditional purchasing process, as well as saving time, effort and costs for the customer. The researcher used the deductive approach in linking the variables (achieving customer satisfaction and Internet of Things technology for booking electronic tickets)
... Show More