Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreAudio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to
... Show MoreRadiation treatment has long been the conventional approach for treating nasopharyngeal cancer (NPC) tumors due to its anatomic features, biological characteristics, and radiosensitivity. The most common treatment for nasopharyngeal carcinoma is radiotherapy. This study aimed to assess the better quality of radiotherapy treatment techniques using intensity-modulated radiotherapy (IMRT) and volumetric-modulated arc therapy (VMAT). The VMAT and IMRT are comparative techniques. Forty patients with nasopharyngeal carcinoma and forwarded for radiotherapy were treated with both advanced techniques, IMRT and VMAT, using eclipse software from Varian. The x-ray energy was set at 6 MV. The total prescribed dose was 70 Gy. The results show that the
... Show MoreThe main function of a power system is to supply the customer load demands as economically as possible. Risk criterion is the probability of not meeting the load. This paper presents a methodology to assess probabilistic risk criteria of Al-Qudus plant before and after expansion; as this plant consists of ten generating units presently and the Ministry Of Electricity (MOE) is intending to compact four units to it in order to improve the performance of Iraqi power system especially at Baghdad region. The assessment is calculated by a program using Matlab programming language; version 7.6. Results show that the planned risk is (0.003095) that is (35 times) less than that in the present plant risk; (0.1091); which represents respectable imp
... Show MoreThe optimum cultural conditions for garamicidin production by local isolate B.brevis were studied.Best result was obtained when the isolate B.brevis was grown on media composed of 1%glucose as carbon source,1% ammonium chloride as a nitrogen source ,0.5% Dipotassium hydrogen orthophosphate as a phosphate source and after 48 hours of incubation at 30C .Garamicidin has been extracted and purified through acid precipition and then extracted by organic solvent (ether& acetone ).Using HPLC the garamicidin antibiotic showed three types A,B and C garamicidin .
Double drum dryer is operated for producing pregelatinized maize starches using feed starch slurries of different
solids(7, 10 and13 g/100 g )content . Steam pressure (2,3,and 4 bar), the level of pool between the drums (4,7,and 10
cm) , and speed of drums rotation (3,4,and 6 rpm) are varied together with the feed solids content in a practical range of
values. The response of the dryer is registered by measuring several output variables, i.e. external drum temperature,
product moisture content, mass flow rate.
Newcastle Disease is one of the most important disease world wide distributions which invade the flock in different age resulting in large economic losses. This study aimed to evaluate the effect of treatment with 4 different concentrations (0.25, 0.5, 1.0 and 2.0 %) of Sodium deoxycholate (SDC) on the vaccinal virus (La Sota) using inoculation in the fragments of Chorioallantoic membrane. The treatment with each of the above 4 concentrations of SDC resulted in an increase in the Hemagglutination titer (HA) of the virus (28, 29.6, 211.6, 214.6) respectively as compared to the HA titer value for the untreated virus (26.6). No significant differences were noticed among all concentrations with regard to their effect on the HA titer, except
... Show MoreThe study was conducted in the poultry field, College of Agriculture, Al-Muthanna University from 1/3/2018 to 6/4/2018 to determine the effect of commercial Ascomax powder produced from seaweed (Ascophyllum nodocum) on some productive performance of broilers. A total of 400, one day, Ross 308 broiler chicks were used for 35 days. The chicks were randomly distributed to 4 treatments, four replicates per treatment (25 chick / replicate). The treatments were as follows: T1: (control treatment), while T2, T3 and T4 added diet by Ascomax powder by 1, 1.5 and 2 g per 1 kg of the basal diet, respectively. The results of the study showed a significant superiority (P <0.05) for the added Ascomax powder treatments compared to the treatment of control
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More