Preferred Language
Articles
/
joe-441
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they are less sensitive to the Human Visual System (HVS) and preserve high image fidelity. MD-5 and RSA algorithms are used for generating the digital signature from the watermark data that is also embedded in the medical image. We apply the algorithm on number of medical images. The Electronic Patient Record (EPR) is used as watermark data. Experiments demonstrate the effectiveness of our algorithm in terms of robustness, invisibility, and fragility. Watermark and digital signature can be extracted without the need to the original image.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Evaluation of the Organic-Pollution Based on the Determination of some Polycyclic Aromatic Hydrocarbons(PAHs) in Tigris River Water in 2012 at Baghdad City , Iraq
...Show More Authors

This study aims to predict the organic pollution produced from the presence of some polycyclic aromatic hydrocarbons (PAHs) and determination it's concentrations (µg/L , ppb) in Tigris river water by a collection twenty-seven water samples from a selected three stations with nine sampling sites and three depths of water (5 cm , 2 m and 4 m) each site for 4.6 km distance of a geographic studied area which is located between the ( Al-Senak and AL-Sarrafiah bridges ) at Baghdad city – Iraq on May, 2012. The geographic location was determined with a Global Positioning System (GPS) and Geographic Information System (GIS) software program. The concentrations of fourteen components (PAHs) were performed using the reverse phase

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Inmateh Agricultural Engineering
DETERMINING THE EFFICIENCY OF A SMART SPRAYING ROBOT FOR CROP PROTECTION USING IMAGE PROCESSING TECHNOLOGY
...Show More Authors

A system was used to detect injuries in plant leaves by combining machine learning and the principles of image processing. A small agricultural robot was implemented for fine spraying by identifying infected leaves using image processing technology with four different forward speeds (35, 46, 63 and 80 cm/s). The results revealed that increasing the speed of the agricultural robot led to a decrease in the mount of supplements spraying and a detection percentage of infected plants. They also revealed a decrease in the percentage of supplements spraying by 46.89, 52.94, 63.07 and 76% with different forward speeds compared to the traditional method.

View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Application of the Holonic Manufacturing System using the Genetic Algorithm : Case Study in Lab 7 of the General Company for the Leather Industry
...Show More Authors

The study aims to achieve several objectives, including follow-up scientific developments and transformations in the modern concepts of the Holistic Manufacturing System for the purpose of identifying the methods of switching to the entrances of artificial intelligence, and clarifying the mechanism of operation of the genetic algorithm under the Holonic Manufacturing System, to benefit from the advantages of systems and to achieve the maximum savings in time and cost of machines Using the Holistic Manufacturing System method and the Genetic algorithm, which allows for optimal maintenance time and minimizing the total cost, which in turn enables the workers of these machines to control the vacations in th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Physical Education
Body Image and Its Relationship With Self–Confidence In Female College of Physical Education and Sport Sciences Students
...Show More Authors

سها علي حسين, هويدة إسماعيل إبراهيم, Journal of Physical Education, 2017 - Cited by 1

View Publication
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Proposed Entropy Loss function and application to find Bayesian estimator for Exponential distribution parameter
...Show More Authors

The aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 08 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Bayes estimators for reliability and hazard function of Rayleigh-Logarithmic (RL) distribution with application
...Show More Authors

In this paper, we derived an estimators and parameters of Reliability and Hazard function of new mix distribution ( Rayleigh- Logarithmic) with two parameters and increasing failure rate using Bayes Method with Square Error Loss function and Jeffery and conditional probability random variable of observation. The main objective of this study is to find the efficiency of the derived of Bayesian estimator compared to the to the Maximum Likelihood of this function using Simulation technique by Monte Carlo method under different Rayleigh- Logarithmic parameter and sample sizes. The consequences have shown that Bayes estimator has been more efficient than the maximum likelihood estimator in all sample sizes with application

Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Synthesized azodyes of 2-amino-1, 3, 4- thiadiazole - 5 - thiol
...Show More Authors

Several azo dyes were synthesized through coupling reaetion of some substituted phenols and B.naphthol with diazonium salt of 2- amino-1,3-4- thiadiazol -5- thiol. All the synthesized compounds during this work were characterized using some speetral data (F.TIRand UV)andM.P . 2-[4 --Hydroxy napthyl-azo ] -1,3,4-Thiadiazol -5-Thiol • 2- [2-- hydroxy –4- NO2 – phenyl- azo]- 1,3,4 - Thiadiazol –5-Thiol. • 2- [3--Amino-4-Hydroxy phenyl –azo]-1,3,4 - Thiadiazol –5-Thiol. . • 2-[2--Amino-4-Hydroxy phenyl -azo]-1,3,4 - Thiadiazol –5-Thiol . • 2- [3--Amino-6- Hydroxy phenyl -azo]-1,3,4 - Thiadiazol –5-Thiol. • 2-[2-- Hydroxy- 5 – chloro – Pheny - azo]- 1,3,4 - Thiadiazol –5-Thiol . • 2- [4-- Hydroxy phenyl -azo] -1,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Comparative Study of Liver Function and Rh Blood Group between both Physiological and Pathological Neonatal Jaundice
...Show More Authors

Abstract

Backgrounds: Jaundice occurs in most newborn due to increased bilirubin concentration. Jaundice is observed during the first week after birth in approximately 60% of term neonates. A high level of bilirubin is neurotoxic and may cause neonatal kernicterus, auditory neuropathy or death.

Objectives: to compare the Rh group compatibility, serum bilirubin (total and direct), serum albumin and several liver enzymes between physiological and pathological neonatal jaundice

Materials and Methods: A cross sectional study for one hundred neonates with jaundice divided into group 1: 50 newborns with physiological jaundice, Group 2: 50 newborns with

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Applied System Innovation
Earthquake Hazard Mitigation for Uncertain Building Systems Based on Adaptive Synergetic Control
...Show More Authors

This study presents an adaptive control scheme based on synergetic control theory for suppressing the vibration of building structures due to earthquake. The control key for the proposed controller is based on a magneto-rheological (MR) damper, which supports the building. According to Lyapunov-based stability analysis, an adaptive synergetic control (ASC) strategy was established under variation of the stiffness and viscosity coefficients in the vibrated building. The control and adaptive laws of the ASC were developed to ensure the stability of the controlled structure. The proposed controller addresses the suppression problem of a single-degree-of-freedom (SDOF) building model, and an earthquake control scenario was conducted and simulat

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF