Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the middle point of intended line. Any modification, addition or deletion in a letter, word, or line in the document will be detected.
BACKGROUND: Anemia during pregnancy is still a challenge throughout the world, and it may cause severe health consequences in the maternal and fetal sides. AIM: This study aims to find out the prevalence of maternal anemia and potential adverse outcomes in Iraq. METHODS: In Medical City Tertiary Center in Baghdad, singleton pregnant ladies came for delivery were involved over 6 months’ period. Based on hemoglobin (Hb) readings; they were divided into no anemia group (Hb>11 g/l) and anemia group which were further subdivided into mild, moderate, and severe (Hb =10–10.9, =7.1–9.9, and <7 g/l, respectively). Full history and examination were performed by attending obstetrician and pediatrician for the upcoming b
... Show MoreThe minimum approaches distance of probing electrons in scanning electron microscope has investigated in accordance to mirror effect phenomenon. The analytical expression for such distance is decomposed using the binomial expansion. With aid of resulted expansion, the distribution of trapped electrons within the sample surface has explored. Results have shown that trapped electron distributes with various forms rather an individual one. The domination of any shape is mainly depend on the minimum approaches distance of probing electrons
Abstract
We produced a study in Estimation for Reliability of the Exponential distribution based on the Bayesian approach. These estimates are derived using Bayesian approaches. In the Bayesian approach, the parameter of the Exponential distribution is assumed to be random variable .we derived bayes estimators of reliability under four types when the prior distribution for the scale parameter of the Exponential distribution is: Inverse Chi-squar
... Show MoreCorruption is one of the barriers to economic growth and investment opportunities, and after the most serious security and stability, that corruption plagued the Iraqi economy is striking and has roots since the eighties of the last century to the present day.
The study aimed to identify practical impact of corruption on investment in the Iraqi economy and revealed the possibilities and obstacles to investment in Iraq and clarify the investment opportunities at the level of Iraq and the impact of corruption on investments.
The focus will be on the statement of the extent of corruption and investment in Iraq and the adoption of the style of economic measurement using cross-section
... Show MoreThe development in the presentation and presentation of the service in order to distinguish them from the same, was one of the most important reasons to choose the current issue to upgrade the level of service, especially in the Iraqi restaurant sector, which has become today of the important sectors successful. The problem of research was to try to answer a range of questions: to what extent are Iraqi restaurants interested in physical service factors? Do Iraqi restaurants apply physical factors in a way that leads to customer satisfaction? Are Iraqi restaurants interested in the satisfaction of their customers? The objective of the current research is to try to determine the extent to which the
... Show MoreNon-thermal (low-temperature) plasma may act as an alternative approach to control superficial wound and skin infections when the effectiveness of chemical agents is weak due to natural pathogen or biofilm resistance. In this paper an atmospheric pressure plasma needle jet device which generates a cold plasma jet is used to measure the effectiveness of plasma treatment against different pathogenic bacteria and to test the individual susceptibility of pathogenic bacteria to non-thermal argon plasma. It is found that, Gram-negative bacteria were more susceptible to plasma treatment than Gram-positive bacteria. For the Gram-negative bacteria Pseudomonas aeruginosa, there were no survivors among the initial 1x108C.F.U (Co
... Show MoreThe image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o
... Show MoreHuman values are the most important concepts that the interest of society has to relay on these conceptual values. Any society will not be stabilized unless adheres to the right principles and values, all nations need such principles and values to stabilize. If any society doesn’t implement the human values that monotheistic religions urges equality between human, the far the society from the religious principles, the less there would be valence between human. The valence is urgent necessity in the current time. The far people get away from values and principles, the more they lose their freedom and dignity, therefore individual has to live with dignity and respect through the adherence to these values and principles. Apparently, equal
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreThe inflammatory bowel disease (IBD), Crohn’s disease (CD) and ulcerative colitis (UC) are heterogenous chronic inflammatory disorders of the gastrointestinal tract. The most widely accepted etiopathogenic hypothesis for these disorders suggests an immune mediated process.
Objective: This study was performed to evaluate the role of interleukine-33 in pathogenesis of inflammatory bowel disease and to correlate their levels with the disease activity and/or severity.
Methods: Fifty five subjects with inflammatory bowel disease (41 ulcerative colitis patients and 14 Crohn’s disease patients) their ages range from 16-65 years and 25 apparently healthy volunteers their ages and sexes were matched with the patients were participated i