Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking types in the same system reaches better results and increases the power of the system and makes it robust against any attack and revel the modification if any at the same time. PSNR has been used as a performance metric to evaluate the study. The result of the new proposed watermark is 54. It is preferable to utilize both a fragile and a robust watermark simultaneously. Index Terms— Robust Watermarking, Fragile Watermarking, Embedded Value, Imperceptibility, Security.
The research deals with the analysis of the city's commercial center using geographic information systems to solve the problem of congestion by evaluating the efficiency and adequacy of car parking lots according to local and Arab standards. Undoubtedly, the importance of car parking areas, as they are not within the desired efficiency within the city, will lead to congestion and traffic becomes very difficult. Thus, the transportation service loses its most important characteristic, which is the ease of movement. Therefore, there has become an urgent need to study and analyze it, as well as to verify the adequacy of the service, and the amount of deficit required to be provided to solve the tra
... Show MoreThe current research aims to find out the extent to which students of the Faculty of Education for Pure Sciences\/Ibn al-Haitham have owned laboratory academic skills, the researcher adopted a descriptive research approach to conform to the goal of the research, the research sample the consisted of 140 students from the Department of Chemistry Phase II, The research tool, which consisted of a measure of laboratory academic skills, which consisted of seven skills and consisted of 28 paragraphs (four paragraphs per field), was prepared and the pent-up scale was chosen because the selected sample were university students, and the results showed the ownership of students' skills of laboratory academic skills other than skill The use of the libr
... Show MoreThe valley Dwiridj of drainage basins task that lies east of Iraq and thus we have in this study the application of tow models athletes on the three basins of the valley to get Mor e values accurate to Estimate the volume of runoff and peak discharge and time climax and through the use of Technology remote sensing (GIS),has been show through the application of both models, that the maximum value for the amount of Dwiridj valley of (1052/m3/s) According to Equation (SCS-CN) and about (1370.2/m3/s)by approach (GIUH) that difference is the amount of discharge to the Equation (SCS-CN) ar not accurate as(GIUH) approaches Equation ecalling the results of the Field ces Department of damand reservoirs that the volume of runoff to the valley wase
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreDried imported blood worms Chironomus reparius was used to motivate the growth of young carp Cyprinus carpio L ., as fish powder was partial and total replaced by blood worms which is a component of the fodder of the common carp fish. Results have shown that blood worm partial replacement treatment surpasses the imported fish powder. Rates of growth motivation of this treatment have been higher than both the control and total replacement processes. Results have shown significant differences in the weight of the fish in the partial replacement of the fish powder by the blood worms.
Abstract : A research was conducted to study the process parameters affecting hexavalent chromium Cr (VI) (carcinogenic compound) the removal percentage from the electrical industries company waste water that contain 88 mg/l of Cr (VI) concentration by adsorption onto tea wastes. Synthetic water with 88 mg/l Cr (VI) concentration was used. Several operation parameters affecting Cr (VI) removal efficiency were investigated, such as pH, initial Cr (VI) concentration, stirring time and tea wastes dose. The experimental results reveal that maximum Cr (VI) removal reached up to 94.26% at pH of 2, stirring time of 180 minute, tea wastes do
... Show MoreThe current study was conductedas a pot experiment to determine the effect of soil texture on biological nitrogen fixation (BNF) of six most efficient local isolates, specified, of Bradyrhizobium. Cowpea (Vignaunguiculata L.), as a legume host crop, was used as a host crop and 15N dilution analysis was used for accurate determination of the amount of N biologically fixed under experimental parameters specified. Soils used are clay loam, sandy clay loam and sandy loam. Biological Nitrogen Fixation (BNF), in different soil textural classes, was as in the following order: medium texture soil > heavy texture soil > light textured soil. Statistical analysis showed that there is a significant variation in BNF % among six Iraqi isolates in the th
... Show MoreThis research is based on interaction of two most important variables to the business organizations in the current era , these two variables are (marketing orientation and quality of service), this research is trying to urge the service organizations to reconsider the mechanisms adopted in the formulation of its plans, It was the application of research in Korek Telecom and Asia Cell Telecom as a sector of service active and important in the business sector in Iraq, the information was obtained through the design of the Likert questionnaire , it was distributed (92) questionnaire , (50) for the company Korek Telecom and (42) of the Asia-Cell and represent research population sample
... Show More