Water level and distribution is very essential in almost all life aspects. Natural and artificial lakes represent a large percentage of these water bodies in Iraq. In this research the changes in water levels are observed by calculating the areas of five different lakes in five different regions and two different marshes in two different regions of the country, in a period of 12 years (2001 - 2012), archived remotely sensed images were used to determine surface areas around lakes and marshes in Iraq for the chosen years . Level of the lakes corresponding to satellite determined surface areas were retrieved from remotely sensed data .These data were collected to give explanations on lake level and surface area fluctuations. It is imp
... Show MoreBackground: Because of the demands for aesthetic orthodontic appliances have increased, aesthetic archwires have been widely used to meet patient's aesthetic needs. The color stability of aesthetic archwires is clinically important, any staining or discoloration will affect patient’s acceptance and satisfaction. This study was designed to evaluate the color stability of different types of aesthetic archwires after immersion into different types of mouth washes. Materials and methods: Four brands of nickel titanium coated aesthetic arch wires: Epoxy coated (Orthotechnology and G&H) and Teflon coated (Dany and Hubit) were evaluated after 1 week, 3 weeks and 6 weeks of immersion into two types of mouthwashes (Listerine with alcohol and
... Show MoreIn this paper, image compression technique is presented based on the Zonal transform method. The DCT, Walsh, and Hadamard transform techniques are also implements. These different transforms are applied on SAR images using Different block size. The effects of implementing these different transforms are investigated. The main shortcoming associated with this radar imagery system is the presence of the speckle noise, which affected the compression results.
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreRepresents light a sovereign and importance in cinematography element of what possessed the physical characteristics make it a sharp image detail or opaque, or any other form as he wants the director, Valdu away from the main function, which emerged with the beginnings of cinema, any access to endanger the proper and good, the Alachtgalat dramatic and psychological are deepened performance lighting and functioned in adjacent with the shadows, all the two complement each other, which affects the image details or even the ability to express their personal depths or the social and psychological same place, and this prompted the researcher to determine the search in the following address: (employing lighting to express their personal duplica
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show More