Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
The aim of this work was to estimate the concentrations of natural and artificial nuclides in some fertilized and unfertilized plant samples. These samples were collected and prepared in a petri dish for the measurements using gamma spectroscopy. The average values of 238U, 232Th, 40K, and 137Cs for the unfertilized plant samples were (11.964 ± 3.226, 8.273 ± 2.639, 402.436 ± 18.099, and 2.761 ± 1.613) respectively, and for the fertilized plant samples were (30.434 ± 5.282, 22.584 ± 4.620, 711.332 ± 25.806, and 6.986 ± 2.542) respectively. The average values of radiological hazard indices, Raeq, D, D for 137Cs, (AEDE)in, (AEDE)out, Iγ, Hin, and Hout for the unfertilized plant samples were (54.782 ± 7.216, 27.306, 0.469, 0.
... Show MoreKlebsiella pneumoniae is a severe opportunistic strain of enteric bacteria that is a major cause of urinary tract infection and pneumonia. This study was conducted in Baghdad City during September 2020-November 2020 on 50 clinical samples of urine, vaginal, sputum, wound swabs, ear swabs, and burn swabs. strains were identified using the VITEK-2 compact system and tested in K. pneumoniae terms of susceptibility to various antimicrobial drugs by Kirby-Bauer test. The isolates were more predominant in the females (56%) compared to males (44%). The antibiotic resistance rate of varied among different isolated clinical sample sources. K. pneumoniae K. pneumoniae isolated from different clinical specimens differed with respect
... Show MoreThe Sebkha is considered the evaporative geomorphological features, where climate plays an active role. It forms part of the surface features in Mesopotamia plain of Iraqi, which is the most fertile lands, and because of complimentary natural and human factors turned most of the arable land to the territory of Sebkha lands. The use satellite image (Raw Data), Landsat 30M Mss for the year 1976 Landsat 7 ETM, and the Landsat 8 for year 2013 (LDCM) for the summer Landsat Data Continuity Mission and perform geometric correction, enhancements, and Subset image And a visual analysis Space visuals based on the analysis of spectral fingerprints earth's This study has shown that the best in the discrimination of Sebkha Remote sensing techniques a
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreThis research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.