Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD on it, the diagonal matrix is selected to determine its norm. The four norms will be processed to produce one unique number used as a watermark and this number can be developed in future by exploiting some other features in constructing watermark number other than SVD process to construct two watermark numbers, each one of them owned special methodology, for avoiding some challenges and changings in the transformation process.
The searchers opinions are variant in determining the extent of impacting political risk in the host country on foreign direct investment decision. (Aharoni,1966) found, in his questionary study for group of foreign companies operating in India, that a political stability is one of the two most important factors, besides the market size, in the attraction of foreign investment, and its availability means that whether this specific country is good for foreign investment. On the other side, (Green and Benntt, 1972) are present a variant opinion to Aharonis opinion. They are reach to result state that a political instability do not impact on the general distribution of foreign i
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreHighlights the role of taxes in being a major source of funding sources internal economic and social development, and then, any decrease in tax revenue caused by tax evasion, for example, would weaken the government's ability to finance their investments and core financing private sector investment as a result of reduced ability to increase their reserves's cash banks, as well as the weakening of the effectiveness of tax evasion taxes as a tool to guide economic activity in the framework of service for development, and to achieve justice. And the statement of the reasons for and methods of evasion mandated to pay the tax due on them, whether legitimately or illegal with the statement of the proposed methods to tackle tax evasion and elimina
... Show MoreAbstract
This study aims to identify the empathy of University Students, as well as the significant differences in sympathy in terms of gender and specialization. To achieve the aims of the study, a scale of empathy was administered to a sample of (450) students collected randomly from Baghdad university. The results showed that the study sample has a level of empathy. There is a significant difference between males and females in empathy, in favor of the female students. There is no significant difference in empathy in terms of specialization (scientific, humanities), and the interaction between males and females. The study came out with a number of recommendations and suggestions.
Abstract
The developments of technology and information that is sweeping the world based on the factors of pressure on the accounting profession in general, and the authors of the accounting information. That becouse the makers of administrative decisions have become in need of new information fit and the environmental situation of the new competition and try to enter new markets,
... Show MoreThis paper presents the motion programming and control of omni-directional mobile robot through the process of building and programming a small robotic platform with secondary design criteria of modularity and simplified control. This is accomplished by combining the positive aspects of several different robotics platform ideas. The platform is shaped like an equilateral triangle with a servo motor, sensors, and omni-wheel, controlled by a PIC microcontroller.
In this work the kinematics, inverse kinematics and dynamic module for the platform is derived. Two search algorithms (the wall-following search and the “most-open-area” search) is designed, tested, and analyzed experimentally.
What linguists mentioned about the infinitive and its use in the linguistic levels of speech, whether with its verb, or what was mentioned in the difference between the infinitive and the noun of the source, are matters that are related to the phenomenon of hearing in speech, a need necessitated by the nature of the linguistic law
Acceptable Bit Error rate can be maintained by adapting some of the design parameters such as modulation, symbol rate, constellation size, and transmit power according to the channel state.
An estimate of HF propagation effects can be used to design an adaptive data transmission system over HF link. The proposed system combines the well known Automatic Link Establishment (ALE) together with variable rate transmission system. The standard ALE is modified to suite the required goal of selecting the best carrier frequency (channel) for a given transmission. This is based on measuring SINAD (Signal plus Noise plus Distortion to Noise plus Distortion), RSL (Received Signal Level), multipath phase distortion and BER (Bit Error Rate) fo
... Show MoreIn the Name of God, the Most Gracious, the Most Merciful
Praise be to God, who taught the pen anthropology unless he knows, and peace and blessings be upon the master of bullying, and the imam of the eloquent Prophet Muhammad, the sincere and faithful, and his family and companions as a whole and whoever followed him to the Day of Judgment. And after:
The science of grammar is among the most important of all language sciences at all, if not the most important of its sciences, due to the multiplicity of its doctrines and schools, the diversity of its methods, its phenomena and subjects, as well as the connection of this science with the most honorable languages,