Autorías: Hadeer Idan Ghanim, Ishraq Mahmood. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 3, 2021. Artículo de Revista en Dialnet.
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreIFRS 17 aims to provide a unified basis for accounting for all types of insurance contracts, including reinsurance contracts, in a manner that benefits both investors and insurance companies and enhances the ability of the financial statements of insurance companies for comparison between companies listed in financial markets around the world. According to this standard, insurance contracts are accounted for on the basis of the Asset-Liability Approach and the use of fair values that the standard requires updating regularly in order to provide more useful information to the users of financial statements, as a result of the failure of reporting requirements for insurance contr
... Show MoreObjectives: To identify the impact of the brain consensus model on the acquisition of Arabic grammar concepts among students in the fourth grade, methodology: The pilot curriculum was used, and a partial control pilot design was adopted. There were 30 female students in the pilot group, 30 female students in the control group, and the two researchers were statistically rewarded among the two groups' students in some variables and used appropriate statistical means to analyse the results, including the test for two independent samples, the square (c2) and the Alpha Kronbach equation.Results: The pilot group outperformed the control group. The results showed that there is a significant statistical difference at the indicative level (0.05) for
... Show MoreThe tax policy is an important tool of fiscal policy tools which is usedasits multiple tools the State seeks to achieve objectives, such as theachievement of economic development.The importance of the research comes from the importance ofeconomic development resulting from economic policies and prudent fiscaland appropriate to the economic situation of Iraq at the moment is the mostimportant tax policy that taxes one of the most important financial instruments.The research aims to clarify the role of tax policy in developing of theIraqi economy.In an effort to achieve the goals researchers tried to prove thehypothesis ((The tax policy and through multiple tools that seeks to contributeto the achievement of economic development in Iraq)).
... Show MoreThe application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the
... Show MoreThe migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show MoreThis research aims to analyze the effect between letter of credit opening and implementation procedures which considered one of the most important Foreign services submitted by bank institutions to their customers on Time contracted time limit commitment contract by some Iraqi commercial banks, descriptive analytical method used in This research The questionnaires designed a tool main research to gather information to get to know the effect , Seventy questionnaire forms were distributed, sixty seven forms were analyzable , The answers were analyzed by the arithmetic mean and standard deviation and test the level of influence between variables simple linear regression. The result showe
... Show MoreThe researcher used the experimental approach due to its suitability and the nature of the research problem. The research community was represented by the eighth-grade students in the Rozak Elementary Mixed School affiliated with the General Directorate of Education in Erbil / the center, for the academic year (2021-2022), the number is (96) students, and the research sample consisted of (63) male and female students, with (31) in the experimental group, and (32) in the control group, and (11) students were excluded by (5) students from the experimental group, and (6) students from the control group, as the excluded, are students who failed and were absent from the lessons, and accordingly, the research sample became composed of (52) mal
... Show More