Preferred Language
Articles
/
bsj-879
Tamper Detection in Color Image
...Show More Authors

In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
Combined DWT and DCT Image Compression Using Sliding RLE Technique
...Show More Authors

A number of compression schemes were put forward to achieve high compression factors with high image quality at a low computational time. In this paper, a combined transform coding scheme is proposed which is based on discrete wavelet (DWT) and discrete cosine (DCT) transforms with an added new enhancement method, which is the sliding run length encoding (SRLE) technique, to further improve compression. The advantages of the wavelet and the discrete cosine transforms were utilized to encode the image. This first step involves transforming the color components of the image from RGB to YUV planes to acquire the advantage of the existing spectral correlation and consequently gaining more compression. DWT is then applied to the Y, U and V col

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Aug 16 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Sep 30 2024
Journal Name
Iraqi Journal Of Science
Molecular and Immunological Detection of Hepatitis C Virus in Patients with Chronic Renal Failure
...Show More Authors

Due to its association with hepatocellular carcinoma and being one of the ten most common malignancies worldwide, hepatitis C viral infection has become a severe public health concern. Therefore, establishing an accurate, reliable and sensitive diagnostic test for this infection is strongly advised. Real-time polymerase chain reaction (PCR) has been created to achieve this purpose. The current study was established to investigate the hepatitis C virus among Iraqi patients with chronic renal failure and to detect the virus immunologically by the fourth generation enzyme-linked immunosorbent assay technique and molecularly by real-time PCR. As a result, out of 50 patients with chronic renal failure undergoing dialysis, 39 patients tes

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Oct 16 2018
Journal Name
International Journal Of Pharmaceutical Quality Assurance
Isolation and Detection of Candida tropicalis from Aborted Placenta in Al-Najaf city/Iraq
...Show More Authors

Background: Candida tropicalis is one of the most causes of vulvovaginal candidiasis (VVC) in women. Systemic candidiasis and candidemia may also occur in pregnancies. Objective: This study was carried out to detect and isolate of this yeast from aborted placenta, which may cause severe complications such as spontaneous abortion. Materials and methods: Fresh aborted placenta were collected and washed by normal saline to remove the blood. Then, cut it into portions and place it in test tube containing 5 ml of normal saline. Finally, shake for 10 minutes, after that, cultured for microbial isolation. Isolation and detection were done by some conventional methods with Api candida and CHROMagar. Results: The results showed that four iso

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Plant Archives
DETECTION OF sHLA-G PROTEINS IN THE SERA OF PATIENTS INFECTED WITH VISCERAL LEISHMANIASIS
...Show More Authors

Visceral leishmaniasis (VL) or kala-azar is one of the worlds most neglected tropical diseases in mortality and fourth in morbidity, rK39 dipstick was used to diagnose the suspected infected patients as cheapest simple technique which can differentiate recent from chronic infection, for disease out-coming, naïve T-lymphocyte cells should be differentiated into pathogen-specific immunity responses, such as T-helper 1(Th-1) or (Th-2). HLA-G is a special protein defined as nonclassical HLA class I molecule can suppress the immune system through prevention of T-cell function by foul all T-cell mechanisms. So, this study aimed to detect and evaluate the level of sHLA-G in the sera of patients infected with VL. The results showed that there was

... Show More
Preview PDF
Publication Date
Tue Jan 05 2016
Journal Name
Iraqi Journal Of Science
Local Study of blaCTX-M genes detection in Proteus spp. by using PCR technique
...Show More Authors

n this study, 25 clinical isolates of Proteus spp. were collected from urine, wounds and burns specimens from different hospitals in Baghdad city, all isolates were identified by using different bacteriological media, biochemical assays and Vitek-2 system. It was found that 15 (60%) isolates were identifies as Proteus mirabilis and 10 (40 %) isolates were Proteus vulgaris. The susceptibility of P. mirabilis and P. vulgaris isolates towards cefotaxime was (66.6 %) and (44.4 %) respectively; while the susceptibility of P. mirabilis and P. vulgaris isolates towards ceftazidime was (20%). Extended spectrum β-lactamses producing Proteus was (30.7 %). DNA of 10 isolates of P. mirabilis and 4 isolates of P. vulgaris were extracted and de

... Show More
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
European Journal Of General Medicine
The Value of Longitudinal Strain versus Coronary Angiography in Detection of Coronary Artery Disease
...Show More Authors

Aims: The aim of this study was to evaluate the value and accuracy of longitudinal strain in detection of coronary artery disease compared to coronary angiography. Results: The left ventricular longitudinal strain-speckle tracking showed evidence of stenosis of left anterior descending artery, circumflex artery and right coronary artery in (86.1%), (76.4%), and (84.7%) respectively. For the stenosis in left anterior descending artery, the current study showed that the longitudinal strain was a good predictor for presence of significant stenosis with a sensitivity of (93.8%), specificity (75%) and accuracy (91.7%) compared with coronary angiography. For the stenosis in right coronary artery, the left ventricular longitudinal strain had

... Show More
View Publication
Crossref (2)
Crossref