The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security
The first chapter includes introduce the research and the problem of the research that there are negligence of some educational institutions and schools management , some parents and supervisors .Also there are some educators who believes that school activities are obstacles means to learning and prevent pupils from studying and understanding the subjects. That may due to social , psychological and educational reasons
The purposes of the researches come from the reports of supervision visits which indicate a lot of difficulties faced by pupils and teachers related to education activities and its influence on in education and the necessity of indentify these difficulties and remedy them
... Show MoreAccording to the theory of regular geometric functions, the relevance of geometry to analysis is a critical feature. One of the significant tools to study operators is to utilize the convolution product. The dynamic techniques of convolution have attracted numerous complex analyses in current research. In this effort, an attempt is made by utilizing the said techniques to study a new linear complex operator connecting an incomplete beta function and a Hurwitz–Lerch zeta function of certain meromorphic functions. Furthermore, we employ a method based on the first-order differential subordination to derive new and better differential complex inequalities, namely differential subordinations.
In this study, successive electrocoagulation (EC) and electro-oxidation (EO) processes were used to minimize some of the major pollutants in real wastewater, such as organics (detected by chemical oxygen demand (COD)), and turbidity. The wastewater utilized in the present study was collected from the Midland Refinery Company in Baghdad-Iraq. The performance of the successive batch EC-EO processes was studied by utilizing Graphite and Aluminum (Al) as monopolar anode electrodes and stainless steel (st.st.) as the cathode. The Taguchi experimental design approach was used to attain the best experimental conditions for COD reduction as a major response. Starting from chemical oxygen demand COD of (600 ppm), the effects of current density (C
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreDeveloping smart city planning requires integrating various techniques, including geospatial techniques, building information models (BIM), information and communication technology (ICT), and artificial intelligence, for instance, three-dimensional (3D) building models, in enabling smart city applications. This study aims to comprehensively analyze the role and significance of geospatial techniques in smart city planning and implementation. The literature review encompasses (74) studies from diverse databases, examining relevant solutions and prototypes related to smart city planning. The focus highlights the requirements and preparation of geospatial techniques to support the transition to a smart city. The paper explores various aspects,
... Show MoreGlobally, iron deficiency anemia is a problematic nutritional deficiency health-related issue that impacts early-adulthood people such as university students. The aim was to asses female nursing students’ knowledge concerning iron deficiency anemia in the College of Nursing, University of Baghdad.
A cross-sectional survey was carried out from the period of June 18, 2023 to December 20, 2023. Nonprobability (purposive) samples of 100 female nursing students were selected from the second, third, and fourth stages in the College of N
Deep learning (DL) plays a significant role in several tasks, especially classification and prediction. Classification tasks can be efficiently achieved via convolutional neural networks (CNN) with a huge dataset, while recurrent neural networks (RNN) can perform prediction tasks due to their ability to remember time series data. In this paper, three models have been proposed to certify the evaluation track for classification and prediction tasks associated with four datasets (two for each task). These models are CNN and RNN, which include two models (Long Short Term Memory (LSTM)) and GRU (Gated Recurrent Unit). Each model is employed to work consequently over the two mentioned tasks to draw a road map of deep learning mod
... Show MoreBackground: One way to target polypharmacy and inappropriate medication in hemodialysis (HD) patients is with medication deprescribing. Objective: To assess the impact of implementing a pharmacist-led deprescribing program on medication adherence among HD patients. Method: A prospective interventional, one-group pretest-posttest-only design study was conducted at a hemodialysis center in Wasit Governorate, Iraq. Medication reconciliation followed by medication review based on the deprescribing program was done for all eligible patients, and the patients were monitored for three months for any possible complications. Results: Two hundred and seventy patients were screened for eligibility. Only one hundred and eighteen were enrolled i
... Show MoreThe necessary optimality conditions with Lagrange multipliers are studied and derived for a new class that includes the system of Caputo–Katugampola fractional derivatives to the optimal control problems with considering the end time free. The formula for the integral by parts has been proven for the left Caputo–Katugampola fractional derivative that contributes to the finding and deriving the necessary optimality conditions. Also, three special cases are obtained, including the study of the necessary optimality conditions when both the final time and the final state are fixed. According to convexity assumptions prove that necessary optimality conditions are sufficient optimality conditions.
... Show More