Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the middle point of intended line. Any modification, addition or deletion in a letter, word, or line in the document will be detected.
This study reported the investigation of the Radio Frequency (RF) signal propagation of Global System for Mobile Communications (GSM) coverage in Emmanuel Alayande College of Education (EACOED), Oyo, Oyo State, Nigeria. The study aims at amplifying the quality of service and augment end users' sensitivity of the wireless services operation. The drive test method is adopted with estimation of coverage level and received signal strength. The Network Cell Info Lite application installed in three INFINIX GSM mobile phones was employed to take the measurement of the signal strength received from the transmitting stations of different mobile networks. The results of the study revealed that MTN has the maximum signal strength with a mean value
... Show MoreThe irony pushes us to inquire about what is in the text of contradiction, irony, suspense, and other acts of paradox, as well as a departure from what is logical, or familiar, that attracts the attention of the addressee, and this is what drives us to introspect the text and interrogate it in order to get to know the intended product of the text or its real or metaphorical intent. On the other hand, the irony is more in the literary text than in the scientific texts. Therefore, critics add the word literature to it in their definition.
As it is represented by the paradox, we will seek to study the paradox of the title and the problematic that it may pose as the beginning of the text, and i
... Show MoreOne of these plants utilized in traditional medicine is Lactuca seriolla Linn., which belongs to the Asteraceae family. It goes by a variety of common names in the world, including prickly lettuce, wild lettuce, jagged lettuce, and Kahu and khas. The work aimed to isolate and characterize some bioactive constituent(s) from the aerial part of Lactuca serriola utilizing Combiflash NEXTGEN and high-performance liquid chromatography (HPLC). Lactuca serriola (aerial part) was extracted with 80% ethanol, then fractionated with hexane. Then 250 mg of hexane extract was mixed with 4 g of silica gel and loaded in cartilage, then bounded to the gold column of combi flash using a solvent system comprised of ethyl acetat
... Show MoreBackground:
The present study was conducted to determine histopathological changes caused by chronic effect of Nitrofurantoin(NFT) in The albino mice Testes. The Study included 40 mice were divided on the five groups: the first group taken distilled water and become control group . the remaining group which are exposure with NFT drug in concentration (100-150-200-250) mg / kg, respectively, Doses were given orally for a period (month and two months). The results of histopathological changes included occurrence of congestion in the blood vessel and degeneration of spermatogonia and aggregation of spermatids in the lumen of semineferous tubules and inhibition of spermatogensis process and decrease of sperm inside the lumen
... Show MoreBackground:
Building Information Modeling (BIM) and Lean Construction (LC) are two quickly growing applied research areas in construction management. This study focuses on identifying the most essential benefits and analyzing the most affecting constraints on the construction sector that construction players face as they attempt to combine BIM-LC in Iraqi construction. Experts assessed 30 benefits and 28 constraints from examining the previous literature, and a two-round Delphi survey formed the responses. Expert consensus analysis was utilized to elaborate and validate responses after descriptive statistical checks had been used for data processing.
According to the study's findings, the benefits include ensuring the most ef
... Show MoreThe digital transformation invites several solutions to optimize professional training. Its particularity lies in the management, conservation and securing of their data to each of the players. The use of the electronic learning booklet with Cloud computing aims to be simple and intuitive, it creates interaction and makes it possible to strengthen the links of the trinomial (Student, Educational tutor, supervisor on a training)
We thought of using a online platform tool using Cloud Computing Technology to overcome the limitations of the "paper" learning booklet. This technical-pedagogical system makes it possible to save all data of the apprentice through evaluation grids and follow-up sheets, both during training periods and in theor
Background: