Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD on it, the diagonal matrix is selected to determine its norm. The four norms will be processed to produce one unique number used as a watermark and this number can be developed in future by exploiting some other features in constructing watermark number other than SVD process to construct two watermark numbers, each one of them owned special methodology, for avoiding some challenges and changings in the transformation process.
The best proximity point is a generalization of a fixed point that is beneficial when the contraction map is not a self-map. On other hand, best approximation theorems offer an approximate solution to the fixed point equation . It is used to solve the problem in order to come up with a good approximation. This paper's main purpose is to introduce new types of proximal contraction for nonself mappings in fuzzy normed space and then proved the best proximity point theorem for these mappings. At first, the definition of fuzzy normed space is given. Then the notions of the best proximity point and - proximal admissible in the context of fuzzy normed space are presented. The notion of α ̃–ψ ̃- proximal contractive mapping is introduced.
... Show MoreThe research aims at determining the type of educational dimensions to be broadcasted in children's television programs, clarifying the technical forms used in children's TV programs, analyzing the educational dimensions provided by children's television programs, and studying the educational dimensions of children's television programs. The researcher used a sample of children's programs: all of us heroes, which is a daily program on the mbc3 channel as well as the program of Tel flowers on the Algerian channel. The researcher designed an analysis content form included categories of analysis. Spss program was used to process the collected data. The research reached several results; the concentration of educational dimensions in
... Show MoreDespite the great economic and commercial importance given to real estate by virtue of its view of the landscape or public roads, US courts have differed in their position on compensation for damages resulting from blocking that view or vision by public projects. Some courts compensated for such damages, other courts approved such compensation. Hence, this research came to shed light on the extent of the possibility of compensation for blocking the view or vision as a result of public projects, and the research has supported us with many judicial decisions.
What distinguishes human rights issues is their importance to the international community and their importance to democratic political regimes, because they are the axis of any political regime that seeks to achieve a successful democratic path and a stable state. So, countries that are interested in human rights try to enshrine those rights and freedoms in their constitutions and reinforce their concepts in their laws and legislations. Not to mention its involvement in international conventions and treaties concerned with human rights and freedoms, and this is what the Sultanate of Oman has worked on and confirm in the provisions of its 1996 constitution and its amendments
Consumer protection requires seeking one official entity to accomplish its tasks. The large number of devices control and implementation in it, return to several ministries, and executive bodies lose coordination and cooperation, and unite efforts to eliminate the types of fraud and control the quality of production within the approved standards. This is in addition to the seriousness of the existence of administrative and legal corruption which hinders the role of inspection committees and representatives of official bodies with the relationship and prevents them from carrying out their duties entrusted to them or presenting them with administrative complications to thwart their duties in consumer protection. This is despite the
... Show MoreLet be an infinite dimensional separable complex Hilbert space and let , where is the Banach algebra of all bounded linear operators on . In this paper we prove the following results. If is a operator, then 1. is a hypercyclic operator if and only if D and for every hyperinvariant subspace of . 2. If is a pure, then is a countably hypercyclic operator if and only if and for every hyperinvariant subspace of . 3. has a bounded set with dense orbit if and only if for every hyperinvariant subspace of , .
In this paper we will study some of the properties of an operator by looking at the associated S-act of this operator, and conversely. We look at some operators, like one to one operators, onto operators. On the other hand, we look at some act theoretic concepts, like faithful acts, finitely generated acts, singular acts, separated acts, torsion free acts and noetherian acts. We try to determine what properties of T make the associated S-act has any of these properties.
The construction industry plays a crucial role in the countries' economy, especially in the developed country. This point encourages the concerned institution to use new techniques and integrate many techniques and methods to maximize the benefits. The main objective of this research is to evaluate the use of risk management, value management, and building information modeling in the Iraqi construction industry. The evaluation process aims at two objectives. The direct objective was to evaluate the knowledge in risk management (RM), value management (VM), and building information modeling (BIM). The indirect objective was to support the participants with information related to the main items mentioned. The questionnaire
... Show MoreThe present study aims at identifying the styles, procedures of Iraqi universities to avoid plagiarism and evaluate these steps, also to evaluate the form prepared by the Directory of Scientific Supervision and Evaluation, Ministry of Higher Education and Scientific Research. The study uses documentary style, 150 teachers in the following colleges (Education Ibn Rushd, Languages and Arts) in university of Baghdad whom already used the aforementioned list were the sample of the study and they asked to give their opinions about the list.The study consists of five sections, first one deals with general view, second explains plagiarism and its types, shapes and reasons,third tackles with ways of detecting plagiarism, its programs, consequences
... Show MoreThe investor needs to a clear strategy for the purpose of access to the financial market, that is, has a plan to increase The share of the profits thinking entrepreneur and new, and highlights the importance of this in that it sets for the investor when it goes to the market, and when it comes out of it, and at what price to buy or sell the stock, and what is the the amount of money it starts. Fortunately, he does not need to invent his own investment strategy, because over the years the development of effective methods of buying and selling, and once you understand how to work these methods investor can choose the most appropriate methods and adapted image that fit his style investment .
&nb
... Show More