Like the digital watermark, which has been highlighted in previous studies, the quantum watermark aims to protect the copyright of any image and to validate its ownership using visible or invisible logos embedded in the cover image. In this paper, we propose a method to include an image logo in a cover image based on quantum fields, where a certain amount of texture is encapsulated to encode the logo image before it is included in the cover image. The method also involves transforming wavelets such as Haar base transformation and geometric transformation. These combination methods achieve a high degree of security and robustness for watermarking technology. The digital results obtained from the experiment show that the values of Peak Signal Noise Ratio (PSNR) and Mean Squared Error (MSE) that apply to one of the set cover images were 68.74 and 0.093, respectively.
The dispersion relation of linear quantum ion acoustic waves is derivate according to a fluid approach that depends on the kinetic description of the systems of charged particles model. We discussed the dispersion relation by changing its parameters and graphically represented. We found through graphs that there is full agreement with previous studies on the subject of interest. That motivates us to discuss the dispersion relation of waves depending on the original basic parameters that implicitly involved in the relationship which change the relationship by one way or another, such as electron Fermi temperature and the density at equilibrium state.
This research includes synthesis of new 5-Nitro isatin derivatives starting from 5-Nitro-3-(ethyl imino acetate)-2-oxo indole (1) namely 5-nitro-3-[(imino acetyl) semicarbazide]-2-oxo indole (2); 5-nitro-3-[(imino acetyl) phenylsemicarbazide]-2-oxo indole (3); 5-nitro-3-[(imino acetyl) thiosemicarbazide]-2-oxo indole (4); 5-nitro-3-[(iminoacetyl) phenylthiosemi carbazide]-2-oxo indole (5); 5-nitro-3-[(methyl imino)-4H-1, 2, 4-triazol-5-ol-3-yl]-2-oxo indole (6); 5-nitro-3-[(methyl imino) 4-phenyl-1, 2, 4-triazol-5-ol-3-yl]-2-oxo indole (7); 5-nitro-3-[(methyl imino) 4-phenyl-1, 2, 4-triazol-5-thiol-3-yl]-2-oxo indole (8) and 5-nitro-3-[(methyl imino) 4H-1, 2, 4-triazol-5-thiol-3-yl]-2-oxo indole (9). The derivatives were characterized us
... Show MoreSeveral recent approaches focused on the developing of traditional systems to measure the costs to meet the new environmental requirements, including Attributes Based Costing (ABCII). It is method of accounting is based on measuring the costs according to the Attributes that the product is designed on this basis and according to achievement levels of all the Attribute of the product attributes. This research provides the knowledge foundations of this approach and its role in the market-oriented compared to the Activity based costing as shown in steps to be followed to apply for this Approach. The research problem in the attempt to reach the most accurate Approach in the measurement of the cost of products from th
... Show MoreMobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,
... Show MoreNumerical simulations have been carried out on the solar chimney power plant systems. This paper gives the flow field analysis for a solar chimney power generation project located in Baghdad. The continuity, Naver-stockes, energy and radiation transfer equations have been solved and carried out by Fluent software. The governing equations are solved for incompressible, 3-D, steady state, turbulent is approximated by a standard k - model with Boussiuesq approximation to study and evaluate the performance of solar chimney power plant in Baghdad city of Iraq. The different geometric parameters of project are assumed such as collector diameter and chimney height at different working conditions of solar radiation intensity (300,450,600,750
... Show MoreZnS:MnP2+P nanoparticles were prepared by a simple microwave irradiation method under mild condition. The starting materials for the synthesis of ZnS:MnP 2+P quantum dots were zinc acetate as zinc source, thioacetamide as a sulfur source, manganese chloride as manganese source (R & M Chemical) and ethylene glycol as a solvent. All chemicals were analytical grade products and used without further purification. The quantum dots of ZnS:MnP 2+P with cubic structure were characterized by X-ray powder diffraction (XRD), the morphology of the film is seen by scanning electron microscopy (SEM) also by field effect scanning electron microscopy (FESEM). The composition of the samples is analysed by EDS. UV-Visible absorption spectroscopy analysis
... Show MoreNowadays, huge digital images are used and transferred via the Internet. It has been the primary source of information in several domains in recent years. Blur image is one of the most common difficult challenges in image processing, which is caused via object movement or a camera shake. De-blurring is the main process to restore the sharp original image, so many techniques have been proposed, and a large number of research papers have been published to remove blurring from the image. This paper presented a review for the recent papers related to de-blurring published in the recent years (2017-2020). This paper focused on discussing various strategies related to enhancing the software's for image de-blur.&n
... Show MoreOptic Disc (OD) localization is a basic step for the screening, identification and appreciation of the risk of diverse ophthalmic pathologies such as glaucoma and diabetic retinopathy.In fact, the fundamental step towards an exact OD segmentation process is the success of OD localization. This paper proposes a fully automatic procedure for OD localization based on two of the OD most relevant features of high-intensity value and vasculature convergence. Merging ofthese two features renders the proposed method capable of localizing the OD within the variously complicated environments such as the faint disc boundary, unbalanced shading, and the existence of retinal pathologies like cotton wall and exudates,which usually share the same
... Show MoreCorona Virus Disease-2019 (COVID-19) is a novel virus belongs to the corona virus's family. It spreads very quickly and causes many deaths around the world. The early diagnosis of the disease can help in providing the proper therapy and saving the humans' life. However, it founded that the diagnosis of chest radiography can give an indicator of coronavirus. Thus, a Corner-based Weber Local Descriptor (CWLD) for COVID-19 diagnostics based on chest X-Ray image analysis is presented in this article. The histogram of Weber differential excitation and gradient orientation of the local regions surrounding points of interest are proposed to represent the patterns of the chest X-Ray image. Support Vector Machine (SVM) and Deep Belief Network (DBN)
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More