Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the middle point of intended line. Any modification, addition or deletion in a letter, word, or line in the document will be detected.
The research deals with the analysis of the city's commercial center using geographic information systems to solve the problem of congestion by evaluating the efficiency and adequacy of car parking lots according to local and Arab standards. Undoubtedly, the importance of car parking areas, as they are not within the desired efficiency within the city, will lead to congestion and traffic becomes very difficult. Thus, the transportation service loses its most important characteristic, which is the ease of movement. Therefore, there has become an urgent need to study and analyze it, as well as to verify the adequacy of the service, and the amount of deficit required to be provided to solve the tra
... Show MoreGenistein (GEN) is The major isoflavone found in soybeans, has a number of cardiovascular health benefits, Postmenopausal syndrome and osteoporosis. A direct flow injection analysis method for estimation of (GEN) in pure and supplements formulation . This system is based on diazotization coupling reactions between procaine penciline (PR) and genistein in basic medium, they formed yellow dyes have maximum absorption at 416 nm. Calibration curve were constructed over different GEN concentrations, linearity for GEN was 10-100 µg.mL-1 and detection limits of 1.51 ?g/mL. In the FIA technique, all analytical factors were analyzed and optimized. The established method was successfully used to determine GEN in the formulations of its supplement
... Show MoreThe research is exposed to an important issue, related to communication obstacles that prevent the media message contained in cultural topics published in local newspapers to reach the hands of the readers; or related to lack of awareness of aspects of that media message, Because it contains immersed vocabulary in elitism where, sometime, the average reader of the newspaper of medium-sized educated, and even the academic reader are unable to decode it and understand its significance.
After determining the problem of the study and the tools that the researcher wants to use to accomplish his research, a sample of students of college of Arts at the University of Baghdad was selected. As they are clo
... Show MoreThis paper critically looks at the studies that investigated the Social Network Sites in the Arab region asking whether they made a practical addition to the field of information and communication sciences or not. The study tried to lift the ambiguity of the variety of names, as well as the most important theoretical and methodological approaches used by these studies highlighting its scientific limitations. The research discussed the most important concepts used by these studies such as Interactivity, Citizen Journalism, Public Sphere, and Social Capital and showed the problems of using them because each concept comes out of a specific view to these websites. The importation of these concepts from a cultural and social context to an Ara
... Show MoreAlthough tattooed literary characters are not new in literature, they are still in children’s literature. Inked characters were nearly absent from children’s books and with the dawn of the twenty first century many of them portrayed tattooed characters. The problem of the study lies in the lack of studies concerning these types of characters in children’s books. The researchers aim to study inked characters in selected stories for children to show the different literary uses of tattoos in these stories, serving not only characterization but theme and symbolism as well. Two children's stories are selected for this study: Tell Me A Tattoo Story (2016) by Alison McGhee and My Teacher Has Tattoos (2023) by Darren Lopez. The researchers st
... Show MoreBackground: Job satisfaction remains as an important concern for both employer and employee. A high-quality teaching staff is the cornerstone of a successful educational system. One step in developing a high quality faculty understands the factors associated with teaching quality and retention. One of these factors is job satisfaction, which has been studied widely by organizational researchers.Objectives: To evaluate the extent of job satisfaction of teaching staff working at AL-Kindy College of medicine and to identify some work-related factors associated with job satisfaction.Methods: A cross- sectional study was carried out. A convenient sample of 50 teaching staff, who had a teaching job at different scientific departments at AL-Kin
... Show MoreThe Sunnah of the Prophet has a great impact in building human behavior, and the formation of Islamic thought, has worked to spread science in all of Egypt, as it carried to the people of the eternal prophecy of the love of science, it was a source of knowledge and civilization. It is a generous source, a rich source of the Islamic nation, always tender, and renewed benefit, which is not only a source of legislation and language but is a source of guidance for thought and guidance of behavior, and the Hadith The importance is obvious In the integration of Islam, and show aspects of human integration in the personality of Mustafa , and the Muslims are interested in talking - collected and codification -, and made the effort of the cent
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreIn the midst of the public narrative film , we discussed the issue of dealing with the current narrative more specialized which its future dimension form shift and twist on the level of construction narrative film in some of its diverse and renewable trends in its two ways theoretical and practical and non-give important implications for the modes of operation of the renewable narrative structures and the fact that the cinema is an arts which always open to ideas in neighboring fields and this come naturally as a result of the continuing intellectual and knowledge sharing between cinema and other science . our current research has already begun to address the issue in a stream of consciousness narrative structure film based on all that t
... Show More