Preferred Language
Articles
/
joe-441
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they are less sensitive to the Human Visual System (HVS) and preserve high image fidelity. MD-5 and RSA algorithms are used for generating the digital signature from the watermark data that is also embedded in the medical image. We apply the algorithm on number of medical images. The Electronic Patient Record (EPR) is used as watermark data. Experiments demonstrate the effectiveness of our algorithm in terms of robustness, invisibility, and fragility. Watermark and digital signature can be extracted without the need to the original image.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The fair Value and its Using Effects on The Financial Reports Quality
...Show More Authors

This research aims at studying the relation between fair value and the Financial Reports Quality  to achieve a number of aims such as :-

1- Throw light on the problems of the measurement that depends on the historic cost as it paves the way towards the method of the fair value in the accounting measurement.

2-Give a general definition for  fair value in the accounting via analyzing the theoretical aspects that relates the subject and the  scientific bases on which the relating accounting treatment depend.

3- Exhibit the characteristics that could be added by the fair value  to the accounting Information .

       The study problem is summarized in that the e

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
The Study of Oral Findings, Oxidative Stress and Antioxidant Vitamin E in Serum and Saliva of Crohn's Patients on Azathioprine Monotherapy and those on Combination of Anti-TNF-α Plus Azathioprine
...Show More Authors

Background: Crohn's disease (CD) is an immunological disorder associated with chronic inflammatory process of several unspecific regions of gastrointestinal tract but frequently detected in the terminal Ilium and proximal colon or both. This disease frequently presented with various oral manifestations as a consequence of inflammatory process of the disease, nutritional deficiency or medications side effects. Several therapeutic approaches have been developed for CD management that are targeting the inflammatory process and directed at controlling the host immune response. Immunosuppressants such as Azathioprine and anti-TNF α agents as well as the combination of them have been widely used as an effective therapeutic modality with a bett

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Ieee Transactions On Industrial Electronics
Singular Perturbation-Based Adaptive Integral Sliding Mode Control for Flexible Joint Robots
...Show More Authors

The flexible joint robot (FJR) typically experiences parametric variations, nonlinearities, underactuation, noise propagation, and external disturbances which seriously degrade the FJR tracking. This article proposes an adaptive integral sliding mode controller (AISMC) based on a singular perturbation method and two state observers for the FJR to achieve high performance. First, the underactuated FJR is modeled into two simple second-order fast and slow subsystems by using Olfati transformation and singular perturbation method, which handles underactuation while reducing noise amplification. Then, the AISMC is proposed to effectively accomplish the desired tracking performance, in which the integral sliding surface is designed to reduce cha

... Show More
View Publication
Scopus (72)
Crossref (69)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2020
Journal Name
مجلة العلوم و التكنولوجية للنشاطات البدنية و الرياضية/ الجزائر
The effect of using the five-finger strategy on learning movement chain on a balance beam in the artistic gymnastics of women
...Show More Authors

Abstract: The aim of the research identify the effect of using the five-finger strategy in learning a movement chain on the balance beam apparatus for students in the third stage in the College of Physical Education and Sports Science, as well as to identify which groups (experimental and controlling) are better in learning the kinematic chain on the balance beam device, has been used The experimental approach is to design the experimental and control groups with pre-and post-test. The research sample was represented by third-graders, as the third division (j) was chosen by lot to represent the experimental group, and a division Third (i) to represent the control group, after which (10) students from each division were tested by lot to repr

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2013
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
ON THE OCCURRENCE OF THE[ MONOGENEAN GYRODACTYLUS TAIMENI ERGENS, 1971 FOR THE FIRST TIME IN IRAQ ON GILLS OF THE COMMON CARP CYPRINUS CARPIO
...Show More Authors

The monogenean Gyrodactylus taimeni Ergens, 1971 was recorded in this study for the first time in Iraq from gills of the common carp Cyprinus carpio Linnaeus, 1758. The description and measurements of this parasite as well as illustration were given. In addition, a list of species of Gyrodactylus so far recorded from C. carpio in Iraq is also included together with a list of all other hosts recorded for each gyrodactylid species.

View Publication Preview PDF
Publication Date
Mon May 01 2023
Journal Name
Journal Of Molecular Liquids
On the influence of hydrocarbons solvents on the inhibition efficiency of some organic corrosion inhibitors: Theoretical and validation studies
...Show More Authors

View Publication
Scopus (10)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The effect of liquidity on the profitability and value of banks listed on Iraq stock market (An analytical study)
...Show More Authors

  The purpose of the study is to analyze the extent of the impact of liquidity as an independent variable on profitability as an intermediate variable and the value of banks listed in the Iraq Stock Exchange as a dependent variable, as the research problem is summarized by the fact that most banks focus on profitability as a phased goal without focusing on maximizing its value as a strategic goal by enhancing the wealth of owners and shareholders. On the long term, the research community is represented by the banks listed on the Iraq Stock Exchange, while the research sample was deliberately chosen, which included three private banks such as Baghdad Commercial Bank, the Iraqi Commercial Bank and the Iraqi Investment Bank, an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 08 2024
Journal Name
Al-academy
Designing a module in light of cognitive learning theories and their impact on the achievement of students of the Department of Art Education and their motivation in learning the subject of aesthetics.
...Show More Authors

This research aims to:
1 – Make a proposed module for (aesthetics) for the second stage - Department of Art Education under education theories.
2 - Verification from the effect of the proposed module on student achievement and motivation towards learning aesthetics material.
To verification the second goal we wording these two hypotheses:
1- There are no individual differences with statistically significant at level (0.05) between the student's scores average. (Experimental group ) who studied according to the proposed module and the average student's scores (control group) who studied in the usual way for the achievement test for the Aesthetics material.
2- There are no individual differences with statistically signifi

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Chemotherapy Effects on the Activities of Some Purine Metabolic Enzymes in Sera of Ovarian Cancer Patients
...Show More Authors

Adenosine deaminase (ADA; Ec: 3.5.4.4), 5´- Nucleotidase (5´– NT; Ec: 3.1.3.5), and AMP – amino hydrolase (AMP – deaminase AMPDA; Ec: 3.5.4.6) activities were measured in sera of ovarian cancer patients before surgery, and after chemotherapy. The results indicated that ADA specific activity increased significantly (P<0.05), while 5´-NT and AMPDA specific activity decreased significantly (P<0.05) in ovarian cancer patients before surgery in comparison with those of their corresponding control women and benign tumors groups. When the activities of these enzymes were measured after chemotherapy, a significant decrease (P<0.05) in ADA activity, and a significant increase (P<0.05) in 5´- NT and AMPDA activities w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref