0
Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThe study deals with reactivity insertion linear and non linear and/or Ramp reactivity expressed as a polynomial in time in the presence of two Feedback mechanisms, using the neutronic-thermohydraulic coupling in order to predict the neutron behavior as a function of time in terms of reactor power. Also, a comparative study has been achieved in the case of the presence of the feedback mechanisms. Insertion of Ramp reactivities in terms of polynomial in time to study the behavior of power and reactivity as a function of time in the presence of two feedback mechanisms (fuel and coolant) has been carried out and the results are displayed as plots, and showed this results corresponding with international results. The present study shows t
... Show MoreThe research aims to find out the impact of cognitive strategies in the mathematical competence of the students of the fourth scientific in the preparatory mahmoudiyah in the Directorate General of The Education of Karkh 2. A post-test of the mathematical competence prepared by (Jassim, 2018) was applied to the sample of (65) students, distributed into two groups of (33) students as experimental group and (32) students as a control group. The results found there are significant differences between the experimental group and the control group in testing the mathematical competence of students for the experimental group.
The current study examined the impact of using PowerPoint presentation on EFL student’s attendance, achievement and engagement. To achieve the aim of this study, three null hypotheses have been posed as follows: There is no statistically significant difference between the mean score of the experimental group attendance and that of the control one; there is no statistically significant difference between the mean score of the experimental group achievement and that of the control one, and there is no statistically significant difference between the mean score of the experimental group engagement and that of the control one. To verify a hypothesis, a sample of sixty students is chosen randomly from the third year, department of English,
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
Anal fistula is an anorectal condition with over 90% of cases being
cryptoglandular in origin and occurring after anorectal abscesses. The traditional method of
treatment of an anal fistula is by excision or de roofing the tract awaiting complete healing.. Aim:
The aim of this study is to assess the efficacy of diode laser 980 nm in the treatment of low fistula in
ano. Methods: The study was performed between June 2019 to end of September 2019, at the
institute of laser for postgraduate study in Baghdad university. A cohort of ten male patients with a
provisional diagnosis of low type anal fistula were selected for this study and treated by interstitial
photothermal therapy of fistula epithelium by diode laser 980nm