The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security
Patients with decompensated cirrhosis have typically prescribed a combination of therapeutic and prophylactic medications. Polypharmacy increases the probability of medication errors and drug related problems. Clinical pharmacists are highly effective at identifying, resolving, and preventing clinically important drug-related problems in their patients' care. The objectives of the study were the identification and classification of drug-related problems, as well as the discussion of these problems with health care providers (physicians, pharmacists, and nurses) and patients. Reduce their incidence as effectively as possible and educate all research participants on the significance of following their prescribed drug regimen
... Show MoreInfertility is one of the types of diseases that occur in the reproductive system. Obesity is a state that can be occurred due to excessive fats, the progression in obesity stage results in a change in adipose tissue and the development of chronic inflammation, endocrine glands disorders and women’s reproductive system, and also increase the infection with covid-19. The study aimed to investigate the effect of the obesity, lipid-profile, and IL-6 on hormones-dysregulation in infertile-women with COVID-19 complications. The current study included 70 samples: 50 infertility-women-with-covid-19-infected, 20 healthy-women/control, the ages of both patients and healthy subjects were selected within the range 18-34 years. Levels of FBS, LH,
... Show MoreThis study aims at suggesting flow as a strategy for training female EFL student-teachers in the teaching training course and finding out the effect of this strategy on their performance and their flow state. The training course syllabuses will be constructed according to the flow nine factors and the teaching skills. The measurement tools are the student-teacher performance checklist that has already been used by the department of English language and SHORT Flow State Scale (S FSS-2). The study population is represented with the (60) female student-teachers/ fourth stage/ evening studies at theEnglish department /college of education for women/the University of Baghdad. The study is used the experimental design in that (30) of the student-
... Show MoreThis abstract focuses on the significance of wireless body area networks (WBANs) as a cutting-edge and self-governing technology, which has garnered substantial attention from researchers. The central challenge faced by WBANs revolves around upholding quality of service (QoS) within rapidly evolving sectors like healthcare. The intricate task of managing diverse traffic types with limited resources further compounds this challenge. Particularly in medical WBANs, the prioritization of vital data is crucial to ensure prompt delivery of critical information. Given the stringent requirements of these systems, any data loss or delays are untenable, necessitating the implementation of intelligent algorithms. These algorithms play a pivota
... Show MoreLanguage always conveys ideologies that represent an essential aspect of the world we live in. The beliefs and opinions of an individual or community can be organized, interacted with, and negotiated via the use of language. Recent researches have paid attention to bullying as a social issue. They have focused on the psychological aspect of bullying rather than the linguistic one. To bridge this gap, the current study is intended to investigate the ideology of bullying from a critical stylistic perspective. The researchers adopt Jeffries' (2010) critical stylistics model to analyze the data which is five extracts taken from Hunt’s Fish in a Tree (2015). The analysis demonstrates
... Show MoreThe present study designed to determine the ethanolic extract of Cyperus rotundus on Liver in Albino Male Mice . In the present study 18 Male mice were used they divided into six groups ( 1st group consedered control group , 2nd group injected by 250 mg/ml from extract , 3th group injected by 300 mg/ml from extract , 4th group injected by 350 mg/ml from extract , 5th group injected by 400 mg/ml from extract and the 6th group injected by 450 mg/ml from extract ) . the expermint lasted for two days and the doses gived by intraperitonial injection . showed from the study results that ethanolic extract for Cyperus rotundus have negative effect on Liver tissue in 250 , 300 , 350 mg/ml concentrations when comparsion with control group . the re
... Show MoreEmotional blackmail is generally defined as manipulating others' emotions for personal gain. It is a type of manipulation that damages healthy relationships among people and turns them into toxic relations leaving the victim in a state of depression and under stress of losing something s/he holds dear. This study aims to identify the pragmatic techniques of emotional blackmail used by both blackmailers and victims in "No One Would Tell" (2018). To do so, the researchers developed an eclectic model comprising Forward and Frazier's (1997) emotional blackmail, Searle’s speech acts (1979), Brown and Levinson’s politeness strategies (1987), Culpeper’s impoliteness strategies (1996, 2005), and Mayfield's taxonomy of fallacy (2007)
... Show MoreThe current research aims to identify the level of compulsive buying behavior and Histrionic Personality among a sample of primary school teachers for the academic year (2021-2022) and in the light of some variables
(sex, marital status). To measure the Histrionic Personality, the researcher applied two scales to a random stratified sample of (200) male and female teachers. The results showed statistically significant differences in the level of compulsive buying behavior according to the gender variable and in favor of female teachers. There are no statistically significant differences in terms of marital status. There are statistically significant differences in the Histrionic Personality based on gender variables in favor of f
... Show More