Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Diabetes mellitus type 2 (T2DM) formerly called non-insulin dependent diabetes mellitus (NIDDM) or adult-onset diabetes is a common disease. Rheumatoid factor is a well-established test used in the diagnosis and follows the prognosis of rheumatoid arthritis (RA). Rheumatoid factor is sometimes found in serum of patients with other diseases including diabetes mellitus (DM), due to the presence of pro-inflammatory cytokines such as TNF- α which play an important role in chronic inflammatory and autoimmune diseases like rheumatoid arthritis (RA). The aim of the study is to investigate the associations between type 2 diabetes mellitus (T2DM) and rheumatoid arthritis (RA) in scope of rheumatoid factor (RF), hyperglycemia a
... Show MoreIn the present work, poly methyl methacrylate (PMMA) doped with Rhodamine 6G was prepared. The spectral properties (absorption and fluorescence) of the films were studied at different concentrations (1x10-5, 2x10-5, 5x10-5, 7x10-5, and 1x10-4mol/l). The investigated samples were made in the form of thin films. This was achieved by dissolving a certain weight of PMMA in a fixed volume of chloroform, composite films was with thickness (25.8μm) at room temperature. The achieved results were pointed out that absorption and fluorescence spectra have taken a wide spectral rang so when increased the concentratio
... Show MoreThe research aims to shed light on the nature of the tax gap in the income tax by the method of direct deduction and its reflection on the financial objective of the tax, and to determine the reasons for this gap in the deduction between the tax due in accordance with the laws and instructions in force and the tax actually paid. The tax gap is a real problem that cannot be ignored for what it represents loss of financial revenues due to the state.
The research problem is represented in the existence of a gap between the tax due according to direct deduction instructions and the tax actually paid according to the financial statements, and to achieve the objectives of the research and test the hypotheses, t
... Show MoreThe Sebkha is considered the evaporative geomorphological features, where climate plays an active role. It forms part of the surface features in Mesopotamia plain of Iraqi, which is the most fertile lands, and because of complimentary natural and human factors turned most of the arable land to the territory of Sebkha lands. The use satellite image (Raw Data), Landsat 30M Mss for the year 1976 Landsat 7 ETM, and the Landsat 8 for year 2013 (LDCM) for the summer Landsat Data Continuity Mission and perform geometric correction, enhancements, and Subset image And a visual analysis Space visuals based on the analysis of spectral fingerprints earth's This study has shown that the best in the discrimination of Sebkha Remote sensing techniques a
... Show MoreIn the oil industry, the processing of vacuum residue has an important economic and environmental benefit. This work aims to produce industrial petroleum coke with light fuel fractions (gasoline, kerosene , gas oil) as the main product and de asphalted oil (DAO) as a side production from treatment secondary product matter of vacuum residue. Vacuum residue was produced from the bottom of vacuum distillation unit of the crude oil. Experimentally, the study investigated the effect of the thermal conversion process on (vacuum residue) as a raw material at temperature reaches to 500 °C, pressure 20 atm. and residence time for about 3 hours. The first step of this treatment is constructing a carbon steel batch re
... Show MoreThe effect of short range correlations on the inelastic longitudinal
Coulomb form factors for different states of J 4 , T 1with
excitation energies 3.553,7.114, 8.960 and 10.310 MeV in 18O is
analyzed. This effect (which depends on the correlation parameter )
is inserted into the ground state charge density distribution through
the Jastrow type correlation function. The single particle harmonic
oscillator wave function is used with an oscillator size parameter b.
The parameters and b are considered as free parameters, adjusted
for each excited state separately so as to reproduce the experimental
root mean square charge radius of 18O. The model space of 18O does
not contribute to the tra
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show More