The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security
Efficiency of Pisum sativum plants in using tricalcium super phosphate (TSP) in presence and absence of mycorrhizal fungi was evaluated in the field experiment in College of Science / Al-Mustansiriyah University. The experiment comprised of (6) treatments prepared from the interaction of two levels of inoculation [non-inoculation with fungus F0 and inoculation with Glomus mosseae fungus (F1)]. And three levels of phosphorus: 0,20,40 Kg P/ha. The experimental size was (1x2)m. Irrigation and hand-weeding were done when needed. The following plant measurements were recorded: (Shoots dry weight, concentration of N and P% in addition to percentage of root infection with mycorrhizal fungi at flowering 50% of plants. The re
... Show MoreThis research discusses the rehabilitation of heritage markets in the historical centers of Islamic Arab cities and their use in the field of cultural tourism as one of the most important tourist attractions and the subsequent revival of the national economy in addition to preserving the urban heritage as these markets part of the historical centers of cities. The research also discusses the preservation of the continuity of heritage markets as a product of cultural heritage value within an integrated framework to preserve the urban heritage in the historic centers of cities. The study then reviews a number of experiences of Arab and Islamic countries in the field of preserving and rehabilitating heritage markets, which qualify them to b
... Show MoreThis paper presents a three-dimensional Dynamic analysis of a rockfill dam with different foundation depths by considering the dam connection with both the reservoir bed and water. ANSYS was used to develop the three-dimensional Finite Element (FE) model of the rockfill dam. The essential objective of this study is the discussion of the effects of different foundation depths on the Dynamic behaviour of an embanked dam. Four foundation depths were investigated. They are the dam without foundation (fixed base), and three different depths of the foundation. Taking into consideration the changing of upstream water level, the empty, minimum, and maximum water levels, the results of the three-dimensional F
YY Lazim, NAB Azizan, 2nd International Conference on Innovation and Entrepreneurship, 2014
هدفت الدراسة إلى التعرف على مستوى تقييم الإعلاميين العراقيين المقيمين في الأردن لتغطية الإصلاحات السياسية و الاقتصادية في العراق من قبل الفضائيات العراقية. و هدفت كذلك إلى التعرف على الف
Economic organizations operate in a dynamic environment, which necessitates the use of quantitative techniques to make their decisions. Here, the role of forecasting production plans emerges. So, this study aims to the analysis of the results of applying forecasting methods to production plans for the past years, in the Diyala State Company for Electrical Industries.
The Diyala State Company for Electrical Industries was chosen as a field of research for its role in providing distinguished products as well as the development and growth of its products and quality, and because it produces many products, and the study period was limited to ten years, from 2010 to 2019. This study used the descriptive approa
... Show MoreThe interest in the intellectual capital and its development is a civilized necessity imposed by the requirements of the times and cannot imagine an advanced society in its potential productivity in poor efficiency of human capital, and features the work environment change permanently, putting the management of financial companies against a constant challenge toward coping with new developments in this changing environment and this is not taken unless owned by these companies qualified human resources and the provision of Culture organizers have, which manifested itself with the research problem by the following two questions:
- Did the intellectual capital value specific financial and
The study of surface hardness, wear resistance, adhesion strength, electrochemical corrosion resistance and thermal conductivity of coatings composed from sodium silicate was prepared using graphite micro-size particles and carbon nano particles as fillers respectively of concentration of (1-5%), for the purpose of covering and protecting the oil distillation towers. The results showed that the sodium silicate coating reinforced with carbon nano-powder has higher resistance to stitches, mechanical wear, adhesive and thermal conductivity than graphite/sodium silicate composite especially when the ratio 5% and 1%, the electrochemical corrosion test confirmed that the coating process of stainless steel 304 lead to increasin
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t