Preferred Language
Articles
/
jih-1073
Digital Watermarking in Color Image Based On Joint Between DCT and DWT
...Show More Authors

The massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by applying DCT transform on the selected sub band's coefficients, this method focuses on the invisibility for the embedded watermark bits, and the quality for the watermarked image; furthermore it focuses on a subjective for the recovered watermark after extraction stage. The proposed method was evaluated by using simple image quality matrix illustrated in the results, and it was found that the proposed method provide good objective quality, the recovered watermark extracted successfully and the quality of recovered watermark are survived.  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Arthroscopic micro fracture and intra articular whole bone marrow injection for the treatment of articular cartilage lesions in the knee joint. Authors
...Show More Authors

Abstract Background: Articular cartilage lesions in the knee joint are frequently seen,its treatment represents a challenge for orthopedic surgeons especially in young age patients and if left untreated,then they can progress to advanced osteoarthritis that may affect the functional status of the patients.Many treatment modalities had developed for these lesions, in the current study arthroscopic micro fracture plus intra articular whole bone marrow(WBM) injection was used as modality of treating these lesions. Objectives: to assess the effectiveness of arthroscopic micro fracture plus WBM intra articular injection as a treatment modality for knee articular cartilage lesions. Patients and Methods : a prospective experimental study was perf

... Show More
Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Engineering
Intelligence in Construction between Contemporary and Traditional Architecture
...Show More Authors

The authentic traditional architecture proved that it is very convenient to the environmental and social regulations where it appeared and lasted for hundred of years.

This traditional architecture got the intelligence in providing thermal comfort for their occupants by the intelligent usage of the building materials and the intelligent planning and designs which took in consideration the climatic condition and the aerodynamics of the whole city as one ecological system starting from the cold breeze passing through its narrow streets till it enters the dwelling units and glides out through the wind catchers.

This architecture had been neglected and replaced by modern imported architecture which had collap

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Analysis The Consistency Between The Tariff And The Exchange Rate And Their Reflection On The Trade Balance In Iraq
...Show More Authors

       The trade balance is considered as a way to join the national economy with the world, So it is the mirror that reflect the economic center of the country and it is point to competitive ability of it, The tariff and the exchange rate perform a great role to motivate the domestic production and improve the trade balance if we direct them to achieve the same purpose. The Iraqi economic has trade balance which achieve overabundant during the years of studying because of the oil exports, while the other exports represent a small percentage it is hardly remember, and expansion in imports from other side causes exhaustion in oil revenues, and this make the trade balance in permanent

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Nternational Journal Of Special Education
Comparative Study between a Combination of Plants Extracts and Drugs on Thyroid Hormones and Lipid Profile in Experimental Animals
...Show More Authors

The thyroid gland is a vital part of the overall endocrine system, which is regulated some of body function as oxygen use, basal metabolic rate, growth, cellular metabolism and development This study shed light on a number of extracts that have been shown to have beneficial effects on the thyroid and its function, as well as the various factors linked to thyroid dysfunction. The experiment was conducted to determine the effect of a mixture of two extracts of "Fucus vesiculosus (150 mg/ kg) with Coleus forskohlii (1000 mg/ kg) and Rosmarinus officinalis (220 mg/ kg) with Camellia sinensis (1.25 mg/ kg)" on thyroid hormones as well as lipids profile and tested the effectiveness of two drugs one of them stimulates the hormones of the thyroid (

... Show More
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Illiteracy and its Impact on the Reality of Iraqi Youth between Heritage and Contemporary
...Show More Authors

Illiteracy has spread in the last years, although it was eliminated in the 1980s. The return of illiteracy brings ignorance, illness, backwardness and regression among nations. It has taken many types, mainly alphabetical, scientific and computer illiteracy. Hence, the increasing nature of illiteracy has attracted the attention of governments and societies alike. This may touch the reality of societies starting with their youth unless those, who are in charge, will find workable solutions for the existing problems. The results of the study revealed that there is a real disaster awaiting the next generation after years of stray, and ignorance of the people in charge who are too engaged in getting their privileges to care about this proble

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Automatic Detection and Recognition of Car Plates Based on Cascade Classifier
...Show More Authors

The study consists of video clips of all cars parked in the selected area. The studied camera height is1.5 m, and the video clips are 18video clips. Images are extracted from the video clip to be used for training data for the cascade method. Cascade classification is used to detect license plates after the training step. Viola-jones algorithm was applied to the output of the cascade data for camera height (1.5m). The accuracy was calculated for all data with different weather conditions and local time recoding in two ways. The first used the detection of the car plate based on the video clip, and the accuracy was 100%. The second is using the clipped images stored in the positive file, based on the training file (XML file), where the ac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Goal Conflict among Twelfth-Grade Students based on Gender and Major
...Show More Authors

The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More