Preferred Language
Articles
/
joe-441
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they are less sensitive to the Human Visual System (HVS) and preserve high image fidelity. MD-5 and RSA algorithms are used for generating the digital signature from the watermark data that is also embedded in the medical image. We apply the algorithm on number of medical images. The Electronic Patient Record (EPR) is used as watermark data. Experiments demonstrate the effectiveness of our algorithm in terms of robustness, invisibility, and fragility. Watermark and digital signature can be extracted without the need to the original image.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Biochemical & Cellular Archives
A COMPARATIVE STUDY ON SOME BIOCHEMICAL PARAMETERS IN INFERTILE PATIENTS.
...Show More Authors

Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Application of Data Mining Techniques on Tourist Expenses in Malaysia
...Show More Authors

Tourism plays an important role in Malaysia’s economic development as it can boost business opportunity in its surrounding economic. By apply data mining on tourism data for predicting the area of business opportunity is a good choice. Data mining is the process that takes data as input and produces outputs knowledge. Due to the population of travelling in Asia country has increased in these few years. Many entrepreneurs start their owns business but there are some problems such as wrongly invest in the business fields and bad services quality which affected their business income. The objective of this paper is to use data mining technology to meet the business needs and customer needs of tourism enterprises and find the most effective

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
A prospective study on sexual deviation deployed in Baghdad crimes
...Show More Authors

The current research aims to identify the types and rates and the reasons for the crimes that are with the origin and sexual scattered deviation between the fabric of Iraqi society, which reticent about because of the culture of the community, where he offered a researcher investigator justice and tribal leaders and lawyers about proportion and the types and causes of crime is the origin of sexual deviance and finally a question asked a researcher in 1000 young lived their adolescence days of the former regime (1979-2003) from going to brothels researcher found that 920 people and 92% had gone to the house to practice adultery and that 70 of them, and by 7% had engaged in masturbation only and that 10 of them have not committed anything

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
A Study on Cosmetic Products Marketed in Iraq: Microbiological Aspect
...Show More Authors

Cosmetic products contain variable amounts of nutrients that support microbial growth. Most contaminants   in   cosmetic   products   include bacteria such as Staphylococcus, Pseudomonas, Klebsiella,   Achromobacter   and   Alcaligenes. Contaminated water  is  a  likely  source  of organisms found in cosmetic products. Products such as shampoo, hand and body lotion, facial cleanser,  and liquid soaps were analyzed. In this study, out of 60 cosmetic products analyzed, 26.4% were found to be contaminated.    Most of the contamination was from bacteria and no fungal contamination was detected.  The highest level o

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study of Irisin in End Stage Renal Disease on Hemodialysis
...Show More Authors

Irisin is a myokine that controls energy metabolism by making adipose tissue brown. The present goal in doing this research was to determine how irisin concentration relates to other biochemical markers of disease. Hemodialysis (HD) for chronic kidney failure. The study included 30 individuals with end-stage renal disease on HD and 30 healthy subjects as the control group. The ages of all patients and the control group ranged from (25 to 60) years. The excluded criteria included patients with viral hepatitis and diabetes. Serum irisin concentration and the level of fasting serum glucose (FSG), urea, creatinine (Cr), total protein (TP), albumin (Alb), albumin to creatinine ratio (ACR), total cholesterol (TC), alanine aminotransferase (ALT),

... Show More
View Publication Preview PDF
Publication Date
Thu May 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Effect of Stiffeners on Shear Lag in Steel Box Girders
...Show More Authors

This paper studies the effects of stiffeners on shear lag in steel box girders with stiffened flanges. A three-dimensional linear finite element analysis using STAAD.Pro V8i program has been employed to evaluate and determine the actual top flange stress distribution and effective width in steel box girders. The steel plates of the flanges and webs have been modeled by four-node isoparametric shell elements, while the stiffeners have been modeled as beam elements. Different numbers (4, 8, and 15) for the steel stiffeners have been used in this study to establish their effects on the shear lag and longitudinal stresses in the flange. Using stiffeners reduced the magnitude of the top flange longitudinal stresses about 40%, but did

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Influence of Nanofluid Flooding on Oil Displacement in Porous Media
...Show More Authors

Hydrocarbon displacement at the pore scale is mainly controlled by the wetness properties of the porous media. Consequently, several techniques including nanofluid flooding were implemented to manipulate the wetting behavior of the pore space in oil reservoirs. This study thus focuses on monitoring the displacement of oil from artificial glass porous media, as a representative for sandstone reservoirs, before and after nanofluid flooding. Experiments were conducted at various temperatures (25 – 50° C), nanoparticles concentrations (0.001 – 0.05 wt% SiO2 NPs), salinity (0.1 – 2 wt% NaCl), and flooding time. Images were taken via a high-resolution microscopic camera and analyzed to investigate the displacement of the oil

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
On Gradient Descent Localization in 3-D Wireless Sensor Networks
...Show More Authors

Localization is an essential demand in wireless sensor networks (WSNs). It relies on several types of measurements. This paper focuses on positioning in 3-D space using time-of-arrival- (TOA-) based distance measurements between the target node and a number of anchor nodes. Central localization is assumed and either RF, acoustic or UWB signals are used for distance measurements. This problem is treated by using iterative gradient descent (GD), and an iterative GD-based algorithm for localization of moving sensors in a WSN has been proposed. To localize a node in 3-D space, at least four anchors are needed. In this work, however, five anchors are used to get better accuracy. In GD localization of a moving sensor, the algo

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 01 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Protective Effect of Cafestol on Doxorubicin-induced Genotoxicity in Rats
...Show More Authors
Doxorubicin is an efficient antineoplastic agent that has a broad antitumour spectrum; however, its genotoxic adverse effects on normal cells can be produced through oxidative damage, and this limits its clinical application. Cafestol is a naturally-occurring diterpene in unfiltered coffee with noteworthy antioxidant, antimutagenic and anti-inflammatory activities.

The present study aimed to investigate the possible protective effect of cafestol against doxorubicin-induced chromosomal and DNA damage in rat bone marrow cells. Wistar

Albino rats of both sexes were administered cafestol (5mg/kg body weight once

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Evaluate the implementation of the investment plan projects A study on the field of the plan projects for the period 2013-2016
...Show More Authors

The main problem of this research is the delay of implementation of the investment plan projects for the period (2013-2016) and the weakness of the staff ability in the ministries and they don’t have the sufficient experience to carry out the implementation process.

Therefore, the research aims to evaluate the implementation of programs and projects of the investment plan in a manner consistent with the objectives set for them without any wasteful of efforts, time and money. And then identify the problems and obstacles to determine the deviations of the implementation of the specific for each sector according to the criteria of evaluation and the form of cost, quality, time and implementation.<

... Show More
View Publication Preview PDF
Crossref (1)
Crossref