Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThis research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.
The Sebkha is considered the evaporative geomorphological features, where climate plays an active role. It forms part of the surface features in Mesopotamia plain of Iraqi, which is the most fertile lands, and because of complimentary natural and human factors turned most of the arable land to the territory of Sebkha lands. The use satellite image (Raw Data), Landsat 30M Mss for the year 1976 Landsat 7 ETM, and the Landsat 8 for year 2013 (LDCM) for the summer Landsat Data Continuity Mission and perform geometric correction, enhancements, and Subset image And a visual analysis Space visuals based on the analysis of spectral fingerprints earth's This study has shown that the best in the discrimination of Sebkha Remote sensing techniques a
... Show MoreKlebsiella pneumoniae is a severe opportunistic strain of enteric bacteria that is a major cause of urinary tract infection and pneumonia. This study was conducted in Baghdad City during September 2020-November 2020 on 50 clinical samples of urine, vaginal, sputum, wound swabs, ear swabs, and burn swabs. strains were identified using the VITEK-2 compact system and tested in K. pneumoniae terms of susceptibility to various antimicrobial drugs by Kirby-Bauer test. The isolates were more predominant in the females (56%) compared to males (44%). The antibiotic resistance rate of varied among different isolated clinical sample sources. K. pneumoniae K. pneumoniae isolated from different clinical specimens differed with respect
... Show MoreThe aim of this work was to estimate the concentrations of natural and artificial nuclides in some fertilized and unfertilized plant samples. These samples were collected and prepared in a petri dish for the measurements using gamma spectroscopy. The average values of 238U, 232Th, 40K, and 137Cs for the unfertilized plant samples were (11.964 ± 3.226, 8.273 ± 2.639, 402.436 ± 18.099, and 2.761 ± 1.613) respectively, and for the fertilized plant samples were (30.434 ± 5.282, 22.584 ± 4.620, 711.332 ± 25.806, and 6.986 ± 2.542) respectively. The average values of radiological hazard indices, Raeq, D, D for 137Cs, (AEDE)in, (AEDE)out, Iγ, Hin, and Hout for the unfertilized plant samples were (54.782 ± 7.216, 27.306, 0.469, 0.
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show More