In this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThe electronic payment systems are considered the most important infrastructure for the work of banks, particularly after a steady and remarkable development in information and communication technology, Which created the reality of the work of the infrastructure for these systems and these systems also become one of the most important components of infrastructure for the work of banks, cause it is one of the most important channels through which the transfer of cash, financial instruments between financial institutions in general and banking in particular.
In order to achieve the objectives of the research, the most important to identify the concept of electronic payment systems, and its divisions, and th
... Show MoreBackground: Crohn's disease (CD) is an immunological disorder associated with chronic inflammatory process of several unspecific regions of gastrointestinal tract but frequently detected in the terminal Ilium and proximal colon or both. This disease frequently presented with various oral manifestations as a consequence of inflammatory process of the disease, nutritional deficiency or medications side effects. Several therapeutic approaches have been developed for CD management that are targeting the inflammatory process and directed at controlling the host immune response. Immunosuppressants such as Azathioprine and anti-TNF α agents as well as the combination of them have been widely used as an effective therapeutic modality with a bett
... Show MoreBackground: The bond strength of root canal sealers to dentin was important for maintaining the integrity of the seal in root canal filling in both static and dynamic situations. In a static situation, it should eliminate any space that allowed the percolation of fluids between the filling and the wall while in a dynamic situation; it was needed to resist dislodgement of the filling during subsequent manipulation. Materials and Methods: Forty mandibular premolars were selected for this study. All canals were instrumented using ProTaper rotary instruments. Instrumentation was done with copious irrigation of 5.25% sodium hypochlorite. Roots were randomly divided into four groups according to the type of cleaning and method of root canal irrig
... Show MoreTo achieve sustainability, use waste materials to make concrete to use alternative components and reduce the production of Portland cement. Lime cement was used instead of Portland cement, and 15% of the cement's weight was replaced with silica fume. Also used were eco-friendly fibers (copper fiber) made from recycled electrical. This work examines the impact of utilizing sustainable copper fiber with different aspect ratios (l/d) on some mechanical properties of high-strength green concrete. A high-strength cement mixture with a compressive strength of 65 MPa in line with ACI 211.4R was required to complete the assignment. Copper fibers of 1% by volume of concrete were employed in mixes with four different aspect ratios
... Show MoreThe study aims to elucidation Difference distribution of the labor force by occupation in Sulaymaniyah governorate for the year 2013 by result field study to governorate and explain different Spatially for labor force by career. and The study reaches That Executive staff and Scribes and who join their high ratio from Total the labor force And the second Grade to Specialists and Technicians and who join their While Occupied career Production workers and who join their and Operators Transport Equipment and Engaged the third Grade from the total labor force and Continued Height in career Executive staff and who join their on the male labor force too . while Production workers in second Grade for male labor force , while the female labor for
... Show MoreAt present, the ability to promote national economy by adjusting to political, economic, and technological variables is one of the largest challenges faced by organization productivity. This challenge prompts changes in structure and line productivity, given that cash has not been invested. Thus, the management searches for investment opportunities that have achieved the optimum value of the annual increases in total output value of the production line workers in the laboratory. Therefore, the application of dynamic programming model is adopted in this study by addressing the division of investment expenditures to cope with market-dumping policy and to strive non-stop production at work.
Shallow foundations are usually used for structures with light to moderate loads where the soil underneath can carry them. In some cases, soil strength and/or other properties are not adequate and require improvement using one of the ground improvement techniques. Stone column is one of the common improvement techniques in which a column of stone is installed vertically in clayey soils. Stone columns are usually used to increase soil strength and to accelerate soil consolidation by acting as vertical drains. Many researches have been done to estimate the behavior of the improved soil. However, none of them considered the effect of stone column geometry on the behavior of the circular footing. In this research, finite ele
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show More