This article proposes a new technique for determining the rate of contamination. First, a generative adversarial neural network (ANN) parallel processing technique is constructed and trained using real and secret images. Then, after the model is stabilized, the real image is passed to the generator. Finally, the generator creates an image that is visually similar to the secret image, thus achieving the same effect as the secret image transmission. Experimental results show that this technique has a good effect on the security of secret information transmission and increases the capacity of information hiding. The metric signal of noise, a structural similarity index measure, was used to determine the success of colour image-hiding techniques within ANN. The results of the ANN were in sequence: 41.2813, 0.6914. The results of the ANN were in sequence 41.2813, 0.6914. These results provide insights into how well the hidden information is concealed within the image and the extent to which the visual integrity of the image is preserved.
This search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as com
... Show MoreThis search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as
... Show MoreWastewater projects are one of the most important infrastructure projects, which require developing strategic plans to manage these projects. Most of the wastewater projects in Iraq don’t have a maintenance plan. This research aims to prepare the maintenance management plan (MMP) for wastewater projects. The objective of the research is to predict the cost and time of maintenance projects by building a model using ANN. The research sample included (15) completed projects in Wasit Governorate, where the researcher was able to obtain the data of these projects through the historical information of the Wasit Sewage Directorate. In this research artificial neural networks (ANN) technique was used to build two models (cost
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MorePalm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main
... Show MoreABSTRACT
The study was conducted at the ruminant research station of the general commission for agricultural research/Ministry of Agriculture, as well as the laboratory of genetic resources of the department of livestock/Ministry of Agriculture and the laboratory of the college of agriculture engineering science, with the aim of determine the genotypic of the expression region (intron 2 and part of exon 3) of the LHX3 gene And its relationship to the fertility rate in local and Shami goats. For this purpose, the RFLP technique was used, and the percentages of genotypes for the LHX3 gene in the local goat sample were 29.17, 50.00, 20.83 for the TT, AT, and AA genotypes, respectively, while in the Shami goa
... Show MoreCeramic art associated with urban growth in the cities, it overlapped with architectural construction, the increasing of population, urban growth, knowledge, and civilization was considered ceramic arts as an important aesthetically architecturally complement in the cities, including those in the squares and architectural institutions in the city of Baghdad .the title (Ceramic Art and Urban Planning in the City of Baghdad) the problem was its wonders : 1- Does ceramic monuments suited their locations in the city of Baghdad with the architectural planning urban of the city.2- Does the recipient interacted with these monuments and the reasons of their existence. Then the aim: knowing the relationship of the ceramic monuments with the urban
... Show MoreGovernment expenditure represents one of the controlling financial policies in the economic affairs and management of the economic cycle in order to achieve price stability, raise the rate of output growth and decrease the level of unemployment. The price stability represents one of the macroeconomic goals that all countries seek without exception, regardless of the economic philosophy adopted by each country; in addition to this is raising the productive capacity and reaching the actual output to the level of the expected output, that is, the level of output related to the natural unemployment rate or what is sometimes called the Non-inflationary unemployment rate. The restriction of government expenditure (G=T+∆B/iP+∆M/P) is
... Show More