Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various attacks.
Background: The roles of AI in the academic community continue to grow, especially in the enhancement of learning outcomes and the improvement of writing quality and efficiency. Objectives: To explore in depth the experience of senior pharmacy students in using artificial intelligence for academic purposes. Methods: This qualitative study included face-to-face individual interviews with senior pharmacy students from March to May 2023 using a pre-planned interview guide of open-ended questions. All interviews were audio-recorded. Thematic analysis was used to analyze the data. Results: The results were obtained from 15 in-depth face-to-face interviews with senior pharmacy students (5th and 4th years). Eight participants were male, an
... Show MoreBackground: The value of lateral cephalometric radiographs to evaluate the pharyngeal airway is limited because it provided 2-dimensional (2D) images of complex 3-dimensional (3D) anatomic structures. Three dimensional analyses of the airway volumes are required to understand oral and pharyngeal adaptations in mouth breathing and nasal breathing subjects. The aim of this study was to measure the pharyngeal airway volume and the size of the face, then compare between pharyngeal airway volume in mouth breathing and nasal breathing subjects and find the gender difference in each group, also to study the relation between pharyngeal airway volume and the size of the face. Material and Methods: Fifty patients including 28 males and 22 females wit
... Show MoreMany studies have been made and still concerning the field of translation. Since the mid-90's a considerable amount of researches has tackled the problem of gender and its effect on the process and the product of translation. Simon (1996, p 508) points out that when comparing women and men as translators and writers through history, women seem to be the weaker side. This paves the way to feminist movements which produce prominent studies concerning gender as a concept and translator's gender as practice on the quality and the accuracy of the translation.
Flotow (in Meschia, 2012, p 1-4) outlines several issues that can be
... Show MoreThe social networking sites have brought about fundamental changes and a qualitative shift in the marketing industry and its strategies. The Iraqi ministries have used this site i.e. Facebook to spread and disseminate values in order to consolidate it in Iraqi society which has witnessed many changes in all aspects of life.
The researcher studies the pages of both ministries to know the values contained in the publications of the pages of these two ministries, the quality of grooming as well as the forms in which these values are marketed.
The researcher uses a survey method and content analysis for the publications of these two pages during the study period starting from January 1, 2
... Show MoreThe research aims to identify the positives formulation entrances authors depending on the setting retaining the names of the authors of Arab veterans and cons of setting the entrances to Arab authors ancient depending on the nickname by desktop diligence without reference to a setting retaining the potential to benefit other libraries disciple of retaining existing in sober university libraries. Use the survey method and adopted a questionnaire distributed to the research sample consisting of employees working in the libraries in question and the total number of forms that have been distributed (50) form .tousel search phrase conclusions from them .
1-The lack of authority control depends on it to find a
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThe aim of this study is to compare the effects of three methods: problem-based learning (PBL), PBL with lecture method, and conventional teaching on self-directed learning skills among physics undergraduates. The actual sample size comprises of 122 students, who were selected randomly from the Physics Department, College of Education in Iraq. In this study, the pre- and post-test were done and the instruments were administered to the students for data collection. The data was analyzed and statistical results rejected null hypothesis of this study. This study revealed that there are no signifigant differences between PBL and PBL with lecture method, thus the PBL without or with lecture method enhances the self-directed learning skills bette
... Show MoreIn this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreIn this paper a modified approach have been used to find the approximate solution of ordinary delay differential equations with constant delay using the collocation method based on Bernstien polynomials.