Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking types in the same system reaches better results and increases the power of the system and makes it robust against any attack and revel the modification if any at the same time. PSNR has been used as a performance metric to evaluate the study. The result of the new proposed watermark is 54. It is preferable to utilize both a fragile and a robust watermark simultaneously. Index Terms— Robust Watermarking, Fragile Watermarking, Embedded Value, Imperceptibility, Security.
Radiation treatment has long been the conventional approach for treating nasopharyngeal cancer (NPC) tumors due to its anatomic features, biological characteristics, and radiosensitivity. The most common treatment for nasopharyngeal carcinoma is radiotherapy. This study aimed to assess the better quality of radiotherapy treatment techniques using intensity-modulated radiotherapy (IMRT) and volumetric-modulated arc therapy (VMAT). The VMAT and IMRT are comparative techniques. Forty patients with nasopharyngeal carcinoma and forwarded for radiotherapy were treated with both advanced techniques, IMRT and VMAT, using eclipse software from Varian. The x-ray energy was set at 6 MV. The total prescribed dose was 70 Gy. The results show that the
... Show MoreThe objective of the present study is to verify the actual carious lesion depth by laser
fluorescence technique using 650 nm CW diode laser in comparison with the histopathological
investigation. Five permanent molar teeth were extracted from adult individuals for different reasons
(tooth impaction, periodontal diseases, and pulp infections); their ages were ranging from 20-25 years
old. Different carious teeth with varying clinical stages of caries progression were examined. An
experimental laser fluorescence set-up was built to perform the work regarding in vitro detection and
quantification of occlusal dental caries and the determination of its actual clinical carious lesion depth by
650 nm CW diode laser (excitat
The current research studies the digital techniques in order to identify the treatments with graphic techniques for the theatrical scene, which includes a number of programs and treatment tools with digital technique to identify the visual and aesthetic dimensions and outputs achieved in the design of the theatrical scene in addition to the options, that they provide in the design of a system of hypotheses for the theatrical world, In order to be an experimental mediator in achieving the creative hypothesis, which limited the research with a pivotal objective which is: identifying the digital techniques employed in the graphic digital design for the scene in the theatrical show. The research lies in its objective limits stated in the met
... Show MoreThe research addressed an analytical field investigation of the locality of meander, the factors responsible of the locality of the meander at certain points of the stream other than others, and the role sequence of these factors in the formation process.
The research revealed that the location of forming the meander was associated closely with the scale structural composition of the bank materials from which the first stage of forming the curved stream, for the inhomogeneous or non-identical opposite banks in their scale structural composition saw an activity of differential corrosion, while the homogeneous and identical opposite banks in their scale structural composition saw an identical corrosion activity in its intensity at both
This research Sheds highlights the procedural protections that must be enjoyed by the consumer in the face of the product, which is the protection of no less dangerous than the substantive protection of our obligations and duties delivered by the legislature upon the product of consumer interest, what is the benefit of the right if the access road to him complicated, so know The consumer has a right to the face of the product, but leaves the claim, either to ignorance For access to this right either to the difficulty of connecting to him.
That this research modest attempt we tried through which to focus on the way to the consumer behavior of arrived right, as we tried to highlight the weaknesses and the complexity of the procedure to
Organizational learning is one of the most important means of human resource development in organizations, but most of the organizations, especially public ones do not realize the importance of organizational learning enough, and estimated his role accurately in building intellectual capital, the resource competitive importantly for organizations of the third millennium and who suffers is other end of lack of understanding of its meaning and how to prove its presence and measured in public organizations, so there is the need for this research, which aims to investigate the effect of organizational learning its processes (knowledge acquisition, Information transfer, Interpreting the information, Organizational me
... Show MoreData security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm
... Show MoreSultan Said bin Sultan bin Ahmed bin Said Al-Busaidi (1223-1273 AH / 1806-1856 AD) was able to rule Oman and Zanzibar in a unified Arab-African state during his reign. However, it was separated for several reasons. Thus, the study aims to clarify the efforts made by Sultan Said for annexing Zanzibar to Oman, establishing the Arab-African Sultanate, and shedding light on the role played by Britain in dividing the Arab-African Sultanate and separating Zanzibar from the Omani rule in (1275 AH-1861 AD). The study has adopted the historical descriptive analytical approach. The study has reached several conclusions, such as: The economic motivators were the most important factors that pushed Sultan Said to move his capital from Muscat to
... Show MoreThis paper demonstrates an experimental and numerical study on the behavior of reinforced concrete (RC) columns with longitudinal steel embedded tubes positioned at the center of the column cross-section. A total of 12 pin-ended square sectional columns of 150 × 150 mm having a total height of 1400 mm were investigated. The considered variables were the steel tube diameters of 29, 58, and 76 mm and the load eccentricity (0, 50, and 150) mm. Accordingly, these columns were divided into three groups (four columns in each group) depending on the load eccentricity (e) to column depth (h) ratio (e/h = 0, 1/3, and 1). For each group, one column was solid (reference), and the other three columns contained steel tubes with hollow rat
... Show MoreAt a time of increasing human potential in the face of crises and risks through the use of technology on a large scale and steadily in various fields of life, and the vulnerability of business organizations as a result of mistakes. The failure of a sudden these errors or omissions or symptoms. Also, some crises occur outside the control of management, others caused by leakage of important information and sometimes secret may be a strategy or a new plan or new project occurs outside the organization to the opposite of what is planned. Therefore, the crisis management are critical to all organizations, because the active management of the crisis helps to ensure the continued prosperity of the organization. Here comes from the resea
... Show More