Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
Bioindicators have an important role in assessing the quality of water bodies. Aquatic oligocheates, was used as a bioindicator to assess the sediment quality of Al-Hindyia and AL-Abbasyia river (branches of Euphrates River in Iraq). Two sites in each river have been chosen for this purpose, site S1 was located at Al-Hindyia River and S2 at Al-Abbasyia River. Some kinds of biological indices were used in this study, comprising the percentage of oligochaetes in benthic invertebrates, ranged from 20.3-60.16%. While the percentage of Tubificidae within benthic invertebrates was close 43.3-43.9%.Index of pollution D ranged from 0.13-0.21. The maximum percentage of aquatic oligochaetes to insects larvae of family
... Show MoreColorectal cancer is the world's 3rd most frequent malignant neoplasm and the 4th most common cancer in Iraq. Leptin and Adiponectin are two major Adipocytokines produced by adipose cells that have opposite effects on the formation of colorectal tumors. Leptin induces tumor growth and metastasis, whereas Adiponectin inhibits it. 1,25-Dihydroxyvitamin D controls and limits cancer cell proliferation, differentiation, and survival. Vitamin C deficiency, on the other hand, has been regularly detected in cancer tissues and has potent anti-cancer properties. The purpose of this study was to look at the biochemical role of circulatory Adipocytokine levels (Adiponectin and Leptin) as well as the anti-cancer potentials of Vi
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreRecently Tobit Quantile Regression(TQR) has emerged as an important tool in statistical analysis . in order to improve the parameter estimation in (TQR) we proposed Bayesian hierarchical model with double adaptive elastic net technique and Bayesian hierarchical model with adaptive ridge regression technique .
in double adaptive elastic net technique we assume different penalization parameters for penalization different regression coefficients in both parameters λ1and λ2 , also in adaptive ridge regression technique we assume different penalization parameters for penalization different regression coefficients i
... Show MoreThe useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables
Abstract:
The research dealt with the study of animal drawings in the fresco, during the Umayyad period, especially in Qusayr Amra and Qasr al-Hayr al-Gharbi. Many imagesto different animals and birds were found and used in various subjects, most notably the hunting and predation scenes.
Abstract
This paper presents an intelligent model reference adaptive control (MRAC) utilizing a self-recurrent wavelet neural network (SRWNN) to control nonlinear systems. The proposed SRWNN is an improved version of a previously reported wavelet neural network (WNN). In particular, this improvement was achieved by adopting two modifications to the original WNN structure. These modifications include, firstly, the utilization of a specific initialization phase to improve the convergence to the optimal weight values, and secondly, the inclusion of self-feedback weights to the wavelons of the wavelet layer. Furthermore, an on-line training procedure was proposed to enhance the control per
... Show MoreThe present study is a hybrid method of studying the effect of plasma on the living tissue by using the image processing technique. This research explains the effect of microwave plasma on the DNA cell using the comet score application, texture analysis image processing and the effect of microwave plasma on the liver using texture analysis image processing. The study was applied on the mice cells. The exposure to the plasma is done by dividing the mice for four groups, each group includes four mice (control group, 20, 50, 90 second exposure to microwave plasma). The exposure to microwave plasma was done with voltage 175v and gas flow on 2 with room temperature; the statistical features are obtained from the comet score images and the textur
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More