Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image recovery after applying JPEG coding to the watermarking image are included.
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show Morekinetic studies were carried out the uterine homogenate time course of the association of with LH in benign and malignant uterine
The integration of gender in urban studies is considered a goal and objective to build a society characterized by justice and equality. It further allows all its residents to enjoy the opportunities to live in a safe urban life. Based on the that, the limitations of the research and its field of interest related to the relationship between gender and urban studies have become clear. The insufficient knowledge in this regard considers gender as a concept that does not exist in itself, but rather overlaps and intersects with several concepts and studies, including urban studies. Thus, it has become necessary to adopt a descriptive methodology that helps reach a theoretical framework to explain the beginnings of such an interaction and inte
... Show MoreHair is an excellent indicator for abnormal concentration of toxic elements , In this study a random samples from girls hair of 12 cm long were irradiated by a flux of neutrons (4x10^ n/ cm^.s) obtained from an Am-Be neutron source of 5-Ci activitity . The y-ray activity measurements were carried out by using a " 5x5 " well- type Nal (Tl) detector. The study indicates clearly that the maximum concentration of elements was at about 7 cm hair length.
Granular carbon can be used after conventional filtration of suspended matter or, as a combination of filtration - adsorption medium. The choice of equipment depends on the severity of the organic removal problem, the availability of existing equipment, and the desired improvement of adsorption condition.
Design calculations on dechlorination by granular - carbon filters considering the effects of flow rate, pH , contact time, head loss and bed expansion in backwashing , particle size, and physical characteristics were considered assuming the absence of bacteria or any organic interface .
Phenomena of an abnormal genitalia was among some specimens of Cicindela aulica Dej.
Collected from Iraq. The fore tarsi of male were asymmetrical having its basal three segments
dilated and clothed beneath with fine bristles as in normal male. While those of the right leg
were found simple as in normal females. Dissection of the genialia of these specimens
showed that they were of two types of both male and female structures.
With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show MoreAs COVID-19 pandemic continued to propagate, millions of lives are currently at risk especially elderly, people with chronic conditions and pregnant women. Iraq is one of the countries affected by the COVID-19 pandemic. Currently, in Iraq, there is a need for a self-assessment tool to be available in hand for people with COVID-19 concerns. Such a tool would guide people, after an automated assessment, to the right decision such as seeking medical advice, self-isolate, or testing for COVID-19. This study proposes an online COVID-19 self-assessment tool supported by the internet of medical things (IoMT) technology as a means to fight this pandemic and mitigate the burden on our nation
The research aims to evaluate Evaluation of the investments Iraqi fund for External development through the application of financial tools to a number of companies of the Iraqi Fund for External Development, and from the point of view to achieve the best returns from investment and the feasibility of the investments of the Iraqi Fund for External Development and the research community represents the Iraqi Fund for External Development and the amount of (28) A company, while the research sample is (4) companies (the Arab Petroleum Transportation Services Company, the Arab Iraqi Company for Livestock Development, the Bauhaus Company for prefabricated buildings and mineral installations, the Arab Fisheries Company) that were chosen
... Show More