In this research we study the effect of UV radiation on pure PC samples and doped samples with plasticizer (DOP) for different exposure times (6, 12, 18, 24h). The study have been made on the change in the IR spectra causes by the UV radiation on both kinds of samples, besides the morphology changes were also studied by the optical microscope. From the results we conclude that the increasing of exposure causes the elaboration of CO2 and C2 gases.
In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreThis paper focuses on the optimization of drilling parameters by utilizing “Taguchi method” to obtain the minimum surface roughness. Nine drilling experiments were performed on Al 5050 alloy using high speed steel twist drills. Three drilling parameters (feed rates, cutting speeds, and cutting tools) were used as control factors, and L9 (33) “orthogonal array” was specified for the experimental trials. Signal to Noise (S/N) Ratio and “Analysis of Variance” (ANOVA) were utilized to set the optimum control factors which minimized the surface roughness. The results were tested with the aid of statistical software package MINITAB-17. After the experimental trails, the tool diameter was found as the most important facto
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
End Stage Renal Disease is a well-known global public health problem. Maintenance hemodialysis is considered a life-saving treatment for patients with such disease. This treatment method that requires patients to be adherent to hemodialysis attendance, dietary and fluid recommendations as well as adherence to prescribed medications to ensure success. The aim of the current study was to assess adherence, perception, and counseling among hemodialysis patients to different modalities of treatment (fluid restriction, dietary recommendations, medications, and hemodialysis schedules). A cross-sectional study carried out on hemodialysis patients who attended to the dialysis centers at al- Karama teachi
... Show MoreThis study aimed to evaluate the sustainable efficiency and calculate the sustainable value, opportunity cost and revenue to cost of potato production farms in Baghdad Governorate. Data were collected from a random sample of 102 spring potato producers in Baghdad governorate for the year 2022, the value-added function was estimated using three levels: economic (seeds and space), and social (education level), while environmental represented by (residual and volatile of nitrogen). Effective resources were calculated to extract the sustainability value- SV appeared on an average of 18023.15 thousand Iraqi dinars. Positive relationship with residual nitrogen and productivity, and Inverse relationship to the amount of volatile nitrogen.
... Show MoreBiometrics represent the most practical method for swiftly and reliably verifying and identifying individuals based on their unique biological traits. This study addresses the increasing demand for dependable biometric identification systems by introducing an efficient approach to automatically recognize ear patterns using Convolutional Neural Networks (CNNs). Despite the widespread adoption of facial recognition technologies, the distinct features and consistency inherent in ear patterns provide a compelling alternative for biometric applications. Employing CNNs in our research automates the identification process, enhancing accuracy and adaptability across various ear shapes and orientations. The ear, being visible and easily captured in
... Show MoreThe use of appropriate and accurate language is of utmost importance when describing people on the move and their dilemma, particularly refugees and displaced persons who have unique legal protection. So, there are a lot of scholars who have investigated the United Nations High Commissioner for Refugees’ (UNHCR) reports, but no one has examined representational and interactional meanings of UNHCR reports. Accordingly, this research aims to explore the role of UNHCR reports in enhancing the value of the humanitarian, which is attributed to the uniqueness of its use of language. The current study investigates the manner in which the textual content interacts with the images that are associated with the category of the UNHCR reports. Four re
... Show More