Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the middle point of intended line. Any modification, addition or deletion in a letter, word, or line in the document will be detected.
The method of heavy metals deposition which is based on cobalt in detection of Carbonic anhydrase enzyme in the Sulcus median in the hid brain (fourth ventricle) in the adult white rat (Rutts rutts). An essential amended in the method has been done by using cobalt chloride (CoCl2) instead of cobalt phosphate (Co3(PO4)2) in the reaction medium. Any efficacy of enzymic histochemical for carbonic anhydrase enzyme did not show in histological sections. The floor of the fourth ventricle of the brain is specific, clearly any histochemical reaction sediments have not been found in sulcus median of the floor of the fourth ventricle. The corresponding stain to green methyl which was observed clearly in sulcus median region. The ventral surface of
... Show MoreÖz
Arzı Kanber/Kamber hikayesi Anadolu, Rumeli, Azerbaycan, Türkmenistan ve Irak gibi Türk dünyasının birçok yerinde birden fazla varyantı bulunan, çok sevilen ve yaygın olarak anlatılan aşk ve dramatik maceralı bir halk hikayesidir. Türk halk hikayelerinin en popüler olanlarından biri sayılan Arzı Kanber/Kamber hikayesi, Anadolu'nun birçok yöresinde bilinmesine rağmen Irak Türkmenleri arasında daha çok sevildiği ve yaygın olarak anlatıldığı tespit edilen birden fazla varyantından da görülebilir. Irak Türkmenleri arasında günümüze kadar hikayenin iki varyantı tespit edilmi
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny Edge detection algo
... Show MoreMany approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good
Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreEvolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E
... Show MoreThe present work aims to study the effect of using an automatic thresholding technique to convert the features edges of the images to binary images in order to split the object from its background, where the features edges of the sampled images obtained from first-order edge detection operators (Roberts, Prewitt and Sobel) and second-order edge detection operators (Laplacian operators). The optimum automatic threshold are calculated using fast Otsu method. The study is applied on a personal image (Roben) and a satellite image to study the compatibility of this procedure with two different kinds of images. The obtained results are discussed.