The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security
Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show MoreThe current study aimed to isolate and diagnose the fungi associated with the inflammatory bowel disease patients with 150 samples distributed between 50 samples from Crohn's patients and 50 samples from ulcerative colitis patients, 50 control from Al-Kindy Al Teaching Hospital in Baghdad, Baghdad. Five types of yeast were isolated and identified, namely C. albicans, C.glabarta, Tropicales, C. parapsilosis, C. and C., krusi C. parapsilosis and.and Aspergillus, Penicillium, Muocer, Rhizopous, Saccharomycosis, and Cryptococcus, The results indicated the dominance of Candida spp. In crohn’s disease, the frequency of isolated Candida albicans was 24 (58.54%), Candida glabrata 11 (26.86%), Candida tropicalis 5 (12.2%) and Candida krusi was 1 (
... Show MoreBased on collections made during March to September 2012. A totals of 58 species belong to 33 genera were identified from extra north to extra south of Erbil governorate, among them 30 species are registered as a new record to flora of Iraq. Most attention was paid to the most common and abundant lichens that present almost in most locations, which were Collema cristatum, Diploschistes scruposus, Lecanora dispersa, Lecanora murales, Pertusaria flavicunda, Placidium lacinulatum, Thelomma californicum and Verrucaria Maura.
The development of thyroid gland in five developmental stages of common carp, Cyprinus carpio L. The thyroid originates from the pharyngeal floor as a median ventral keel in late embryos having four pairs of arches. It differentiates into profollicular aggergations and true follicles with flattened walls and empty lumina or with lumina filled with cotton waste-like material in three days-old elvers. Secretion of homogeneous eosinophilic colloid with a limited increase in the height of follicular wall is noted in five days-old elvers. In nine days-old individuals the follicles increase in size due to coallescence. The thyroid gland reaches its maximal activity as judged by its histology in one-two months-old individuals. The gland is of t
... Show Morehis study aims to determine most stable isobar from some isobaric elements with mass number (A= 50-65 & 180-195). This aim achieved by, firstly: plot mass parabolas for these isobaric family, second: calculated the atomic number for most stable isobar (ZA) value. To plot the mass parabola, the binding energy (B.E) calculated from semi empirical formula for these isobars. The mass number (A) plotted as a function to the (ZA) for each range; we get a linear relationship between them. An empirical formula for the most stable isobar has been developed from this linear dependence. From the results, we can see that mass parabolas for isobaric elements with odd mass number (A) are different from the mass parabolas of even mass number (A) isobars,
... Show MoreVideogames are currently one of the most widespread means of digital communication and entertainment; their releases are attracting considerable interest with growing number of audience and revenues each year. Videogames are examined by a variety of disciplines and fields. Nevertheless, scholarly attention concerned with the discourse of videogames from a linguistic perspective is relatively scarce, especially from a pragma-stylistic standpoint. This book addresses this vital issue by providing a pragma-stylistic analysis of the digital discourse of two well-known action videogames (First Person Shooter Games). It explores the role of the digital discourse of action videogames in maintaining real-like interactivity between the game and the
... Show MoreFR Almoswai, BN Rashid, PEOPLE: International Journal of Social Sciences, 2017 - Cited by 22
Gaines's A Lesson Before Dying (1993) is about more than the challenges associated with being blacking an Eurocentric society. Though Gaines positions the story within the context of the African American experience, its central theme investigates what it means to be human. The Afro-American writer Ernest Gaines consistently writes about people who face the problems of being denied humanity, dignity, and self-worth. The article illustrates one man's struggle to gain recognition of his humanity in the court (as his attorney insists on calling him a hog for a crime he did not commit) and how this recognition will initiate a change in the community.
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show More