Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Background: The bond strength of root canal sealers to dentin and gutta-percha seems to be an important property for maintaining the stability of root canal filling, which potentially influences both leakage and root strength. The objective of this, in vitro, study was to evaluate the shear bond strength of three different endodontic sealers (Gutta-Flow, AH Plus, Apexit Plus) to dentin, in the presence and absence of the smear layer and gutta percha. Material and Methods: After slicing off the occlusal 2mm of 60 extracted human maxillary premolar teeth, the exposed dentin served as the tested surfaces; the teeth were fixed with cold cure acrylic, and were divided into two groups according to the smear layer presence, group A without smear
... Show MoreBackground: The main objective was to compare the outcome of single layer interrupted extra-mucosal sutures with that of double layer suturing in the closure of colostomies.
Subjects and Methods: Sixty-seven patients with closure colostomy were assigned in a prospective randomized fashion into either single layer extra-mucosal anastomosis (Group A) or double layer anastomosis (Group B). Primary outcome measures included mean time taken for anastomosis, immediate postoperative complications, and mean duration of hospital stay. Secondary outcome measures assessed the postoperative return of bowel function, and the overall mean cost. Chi-square test and student t-test did the statistical analysis..
Resu
... Show MoreIn recent years, the positioning applications of Internet-of-Things (IoT) based systems have grown increasingly popular, and are found to be useful in tracking the daily activities of children, the elderly and vehicle tracking. It can be argued that the data obtained from GPS based systems may contain error, hence taking these factors into account, the proposed method for this study is based on the application of IoT-based positioning and the replacement of using IoT instead of GPS. This cannot, however, be a reason for not using the GPS, and in order to enhance the reliability, a parallel combination of the modern system and traditional methods simultaneously can be applied. Although GPS signals can only be accessed in open spaces, GP
... Show MoreNitrogen heterocycles are of a special interest because they constitute an important class of natural and non natural products, many of which exhibit useful biological activities.Among these nitrogen heterocycles are 1, 3, 4-thiadiazole containing compounds. The therapeutic effects of these derivatives have been well studied for a number of pathological conditions including inflammation, pain, or hypertension. Moreover, synthesis of thiadiazoles has attracted wide-spread attention due to their diverse applications as antibacterial, anticancer, antifungal anti-inflammatory and antidepressant agents.According to this information’s new derivatives of 1, 3, 4-thiadiazole were designed and synthesized and in the hope of having some act
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreTill now, isatin derivatives have received a lot of interest in organic and medicinal chemistry due to their significant biological and pharmacological activities. Schiff’s and Mannich bases of isatins are an effective group of heterocyclic derivatives that play a significant role in medicinal chemistry as antimicrobial agents. In light of these facts, new Schiff bases and Mannich bases of isatin were synthesized. The monomer Mannich bases; 3(a-e) have been synthesized by reacting isatin with different secondary amines, piperidine, morpholine, and pyrrolidine, dimethylamine, diphenylamine, separately, and formaldehyde, while the dimer (5) formed by using piperazine and formaldehyde which then react separately with Phenylhydrazine
... Show More