In this research paper, a new blind and robust fingerprint image watermarking scheme based on a combination of dual-tree complex wavelet transform (DTCWT) and discrete cosine transform (DCT) domains is demonstrated. The major concern is to afford a solution in reducing the consequence of geometric attacks. It is due to the fingerprint features that may be impacted by the incorporated watermark, fingerprint rotations, and displacements that result in multiple feature sets. To integrate the bits of the watermark sequence into a differential process, two DCT-transformed sub-vectors are implemented. The initial sub-vectors were obtained by sub-sampling in the host fingerprint image of both real and imaginary parts of the DTCWT wavelet coeffi
... Show MoreKlebsiella pneumoniae is one of common hospital-acquired bacteria causing nosocomial pneumonia, urinary tract infections, and intra-abdominal infections. The aim of this study is investigating the Modulation effect of Zinc Oxide nanoparticles (ZnO NPs) against multidrug resistant K. pneumonia which was isolated from Respiratory Tract Infections (RTIs). The results of isolation and characterization of bacterial specimens showed that 20.81% of RTIs were Klebsiella pneumoniae. The strongest isolate showed resistant for most usable antibiotics selected. Simultaneously, ZnO NPs were produced by an aqueous extract of Green Tea leaves as a reducing and stabilizer agent. The Ultraviolet-Visible (UV-Vis) spectrum was indicated a successful produc
... Show MoreDiabetes mellitus (DM) is a metabolic and hormonal disorder in which the body does not produce sufficient or respond ordinarily to insulin, leading to an increase in blood sugar (glucose) levels. This disordered has many side effects on body health, one of them being oral health. This study aimed to find these effects on several oral immune parameters included (IL6, CRP, and alpha-amylase) and the possible use of these parameters in the prediction of oral health and further risk sequel. A total of 91 specimens including 51 DM patients and 40 apparently healthy individuals were enrolled in this study which was carried out from November/2021 to February/2022. The results revealed that, abnormal increase of both IL6 and CRP in the saliva of
... Show MoreTwo new halogenated azo-Schiff ligands were prepared in two steps. The first step included a condensation between 4-amino acetophenone and 2-fluoro-4-bromo aniline to give the corresponding Schiff base. In the second step, the diazonium salt of this Schiff base reacted with 2-naphthol and 4,5-diphenylimidazole to form two new azo-Schiff base derivatives as ligands; (3-((E)-(4-((E)-1-((4-bromo-2-fluorophenyl) imino)ethyl) phenyl) diazenyl) naphthalen-2-ol (HSBAN) (L1) and ((E)-N-(4-bromo-2-fluorophenyl)-1-(4-((E)-(4,5-diphenyl-1H-imidazol-2-yl)diazenyl) phenyl) ethan-1-imine) (HSBAI) (L2), respectively. These new ligands were characterized by mass spectrometry, FT-IR, 1H NMR, UV-Visible spectroscopy and elemental microanalysi
... Show MoreDigital images are open to several manipulations and dropped cost of compact cameras and mobile phones due to the robust image editing tools. Image credibility is therefore become doubtful, particularly where photos have power, for instance, news reports and insurance claims in a criminal court. Images forensic methods therefore measure the integrity of image by apply different highly technical methods established in literatures. The present work deals with copy move forgery images of Media Integration and Communication Center Forgery (MICC-F2000) dataset for detecting and revealing the areas that have been tampered portion in the image, the image is sectioned into non overlapping blocks using Simple
... Show MoreFour subsurface sections and electrical, porosity logs, and gamma-ray logs of the Khasib Formation (age Late Turonian-Lower Coniacian) were studied to identify reservoir characteristics and to evaluate the reservoir properties of the Khasib reservoir units in the East Baghdad oilfield. The lithology of the formation is limestone throughout the whole sequence in all studied wells EB-83, EB-87, EB-92, and EB94. It is bounded conformably from the top by Tanuma Formation and has a conformable lower contact with Kifl Formation. The lower and upper boundaries of the formation were determined using well log analysis, and the formation was divided into three main rock units (Kh1, Kh2, and Kh3), depending on the porosity logs. The porosi
... Show MoreCloud computing describes computer services provided through the internet and includes a wide range of virtualization resources. Because cloud computing is made up of a sizable number of heterogeneous autonomous systems with an adaptable computational architecture, it has been widely adopted by many businesses. The scheduling and management of resource utilization, however, have become more difficult as a result of cloud computing. Task scheduling is crucial, and this procedure must schedule tasks on the virtual machine while using the least amount of time possible. Utilizing an effective scheduling strategy enhances and expedites cloud computing services. Optimization techniques are used to resolve cloud scheduling problems.
... Show MoreA fuzzy valued diffusion term, which in a fuzzy stochastic differential equation refers to one-dimensional Brownian motion, is defined by the meaning of the stochastic integral of a fuzzy process. In this paper, the existence and uniqueness theorem of fuzzy stochastic ordinary differential equations, based on the mean square convergence of the mathematical induction approximations to the associated stochastic integral equation, are stated and demonstrated.
Radio protective effects of metformin and its ability to alter the spontaneous and induced genotoxic and cytotoxic levels effects on human peripheral blood lymphocytes were investigated in this study. Metformin, a hypoglycemic oral drug, is a biguanide derived from Galega officinalis that is widely utilized in controlling type 2 diabetes mellitus. Whole blood samples from 10 healthy donors (5 males and 5 females) were exposed to two doses of gamma-rays (1 and 2 Gray). Lymphocytes in cultures were treated with metformin (10 and 50µM) before gamma-irradiation. Cytokinesis-block micronucleus test was used to evaluate the protective effects of metformin on radiation induced genomic damage, cytostasis and
... Show MoreVisceral leishmaniasis (VL), the second-most-serious parasitic illness after malaria, is currently endemic in more than 88 countries. Need for new anti-leishmanial compounds is currently being taken into consideration by researchers due to resistance and lack of effective vaccinations. This research was conducted to find out more about the effect of artemisinin (ART). ART was examined in vitro promastigotes stages and ex vivo amastigotes stages of the Iraqi strain of Leishmania donovani in U937 cell line after 24, 48 and 27 hours using MTT assay. In addition, the level of macrophage nitric oxide (NO) was measured using Griess assay in U937 cell line. The results of promastigotes viability percentage
... Show MoreThe dramatic decrease in the cost of genome sequencing over the last two decades has led to an abundance of genomic data. This data has been used in research related to the discovery of genetic diseases and the production of medicines. At the same time, the huge space for storing the genome (2–3 GB) has led to it being considered one of the most important sources of big data, which has prompted research centers concerned with genetic research to take advantage of the cloud and its services in storing and managing this data. The cloud is a shared storage environment, which makes data stored in it vulnerable to unwanted tampering or disclosure. This leads to serious concerns about securing such data from tampering and unauthoriz
... Show MoreDigital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of various met
... Show MoreThis study includes collection of 70 swabs samples of burns from patients were
admitted in three hospitals (Baghdad, Al- Numaan and burns injuries Hospital). All
swabs samples were cultured on blood and MacConkey agar media to isolate and
identify pathogenic bacteria according to their morphological , biochemical and
growth characters. Growth of bacteria on selective media showed the following
results: Pseudomonas aeroginosa 44.28% , Klebsiella pneumonia 30% ,
Staphylococcu saureus 8.57% , Escherichia coli 4.28% , Proteus vulgaris 4.28 % ,
Enterobacter spp. 5.71% , Acinetobacter baumanni 2.89 %. Different concentrations
were prepared from leaves ethanolic crude extract of Catharanthus roseus , then the
anti-bac
The main objectives of the present research are of two goals; first, to define and
locale the main cover types (components) of AL-Hawizeh Marshes, and second, to
track and detect the changes encountered in these cover types (components) during
the last three decades time episodes To fulfill these goals, LANDSAT and MODIS
images were applied. The LANDSAT images (MSS-1973, TM-1990 and ETM+
2002) were used to determine the Marshlands cover types before, during and after
the Marsh destruction (marshes dehydrations). One MODIS image was selected to
cover the main changes that have been happened in 2010. Programming; Supervised
classifications (minimum distance classification) were applied for monitoring
This study investigates factors responsible for apathy or lack of interest in the study of Islamic Studies Education as a course in Tai Solarin University of Education, Ijagun,Ijebuode, Ogun State of Nigeria. It is believed generally that some students show lack of interest in some courses at the under graduate level and this eventually interferes with enrolment or population of students that study the course or affect their performance if they eventually enroll for the course. This study therefore investigates the factors responsible for the apathy of students towards Islamic studies and equally proffer solution to the identified problems. In carrying out this research the descriptive approach was used. The research instrument used are
... Show MoreOne of the most interested problems that recently attracts many research investigations in Protein-protein interactions (PPI) networks is complex detection problem. Detecting natural divisions in such complex networks is proved to be extremely NP-hard problem wherein, recently, the field of Evolutionary Algorithms (EAs) reveals positive results. The contribution of this work is to introduce a heuristic operator, called protein-complex attraction and repulsion, which is especially tailored for the complex detection problem and to enable the EA to improve its detection ability. The proposed heuristic operator is designed to fine-grain the structure of a complex by dividing it into two more complexes, each being distinguished with a core pr
... Show MoreIn this paper we present a new method for solving fully fuzzy multi-objective linear programming problems and find the fuzzy optimal solution of it. Numerical examples are provided to illustrate the method.
A New Mannich base [N-(4-morpholinomethyl)-1,8-naphthalimide] (L), was synthesized and characterized by C.H.N analysis, FTIR, UV-Vis and 1HNMR spectral analysis. Metal ion complexes of (L) with Pt(IV), Rh(III), Ru(III) and Pd(II) ions were prepared and characterized by FT-IR, and UV-Vis spectroscopy, elemental analysis (C.H.N), flame atomic absorption techniques as well as magnetic susceptibility and conductivity measurements. The results showed that metal ion complexes for all complexes were found in [1:2] [M:L] ratio except for Pd(II) complex which was found in [1:1] [M:L] ratio. Hyperchem-8 program has been used to predict structural geometries of the (L) and it's complexes in gas phase. The electrostatic potential (EP) of the (L) was
... Show Moreتبتدأ فكرة الدين مع بداية الانسان، ولا توجد فكرة مؤثرة في المجتمعات مثل الدين، الذي أرتبط نشؤه بحياة الانسان منذ أقدم الأزمنة، وكسائر الديانات حثت الديانة الرافدينية على الجانب الاخلاقي للفرد، وضرورة أن يكون ملتزماً بتقديم فروض الطاعة والالتزام بطقوس العبادة للحصول على الإثابة المتمثلة بالجزاء الدنيوي، أما الفكر السياسي فأنه قديم قدم تكون المجتمعات البشرية، إذ أرتبطت معرفة السياسة والبدء بممارساتها بو
... Show MoreTitanium dioxide (TiO2) Nano powder has been synthesized by hydrothermal method. The reaction took place between titanium tetrachloride (TiCI4) and mixture solution consisted of deionized water and ethanol, in the ratio (3:7) respectively. Structure and surface morphology of TiO2 Nano powder at different annealing temperatures in the range 200-800°C for 120 min were characterized by X-ray diffraction (XRD), Atomic Force Microscope (AFM), Scanning Electron Microscopy (SEM), FT-IR and UV/visible spectroscopy measurements. The results show that with an increase in annealing temperature, the value of the intensity of (110) peak for rutile phase increases while the value of the full-width at half maximum (FWHM) decreases, and the band gap de
... Show MoreIn any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English characte
... Show MoreThis study is concerned with the identification of the validity of the Recent sediments deposited in the Playa for the purpose of making the laboratory bricks by extrusion and pressing. The steps followed in this study included the formation and then burning of the pyramids at (950-1100) C° for one hour of maturity to determine their applicability to the brick industry. The study area is located in Al Muthanna province, south of Iraq. It is located south of the district of Samawah at a distance of 80 km and to the north-west of Salman district, 64 kilometers south of Baghdad, represented by three hosts: (DHS 1, DH2 and S). The results of the chemical analysis of the study samples showed that they consist of the following major oxides: S
... Show MoreThe pollution of aquatic ecosystems with toxic heavy metals is representing a major environmental issue, as a result of releasing these metals to ecological ambient without treatment, leading to their persistence and non-biodegradation in the environment. Various traditional methods are utilized as an attempt to remove heavy metals from waste water but still without making any actual progress. This study hypothesizes that Eichhornia crassipes (water hyacinth) dried leaves powder is potential in removing some of these heavy metals (HM), including lead, copper, cadmium and chrome from aqueous solutions via biosorption influenced by some variable experimental factors. This aim was approached by using two different experimental conditions: (
... Show MoreThe aim of this paper is to construct the analysis mathematical model for stream cipher cryptosystems in order to be cryptanalysis using the cryptanalysis tools based on plaintext attack (or part from it) or ciphertext only attack, choosing Brüer generator as study case of nonlinear stream cipher system.
The constructing process includes constructing the linear (or non-linear) equations system of the attacked nonlinear generator. The attacking of stream cipher cryptosystem means solving the equations system and that means finding the initial key values for each combined LFSR.
The abuse of women is an issue that persists throughout the ages till the present time because people are still living in a world of a dominated idea which is known as man is the self and woman is the other. So the objective of this research paper is to argue this global issue using Van Dijk's Ideological Square (1998) as a framework so as to examine the ideologies that underline the use of language in The Handmaid’s Tale. It is hypothesized that the ideology of oppression is exposed in the novel throughout using the ideological strategies of positive- self presentation and negative-other presentation. Ultimately, it concludes that the novelist employs both, male and female, characters to consistently ridicule and offer negati
... Show MoreIn this work various correlation methods were employed to investigate the annual cross-correlation patterns among three different ionospheric parameters: Optimum Working Frequency (OWF), Highest Probable Frequency (HPF), and Best Usable Frequency (BUF). The annual predicted dataset for these parameters were generated using VOCAP and ASASPS models based on the monthly Sunspot Numbers (SSN) during two years of solar cycle 24, minimum 2009 and maximum 2014. The investigation was conducted for Thirty-two different transmitter/receiver stations distributed over Middle East. The locations were selected based on the geodesic parameters which were calculated for different path lengths (500, 1000, 1500, and 2000) km and bearings (N, NE, E, SE, S,
... Show MoreMethotrexate (MTX) is still one of the gold standard treatments for rheumatoid arthritis (RA). It shows diverse outcomes in blood level and clinical response, this was demonstrated by its relation to the genetic polymorphism in the pharmacogenetic study. This study aimed to investigate the role of methylenetetrahydrofolate reductase (MTHFR) gene polymorphisms in relation to MTX efficacy and toxicity in Iraqi Kurdish RA patients. Sixty-four RA patients were involved in this study with an average age of 47.78 ±14.08 and female to male ratio of (8.1). Diagnosis and disease activity were confirmed. Blood analyses, including those of laboratory markers of disease activity, were done. The 28 joint disease activity score (DAS28-CRP) w
... Show MoreThrough this study, the following has been proven, if is an algebraically paranormal operator acting on separable Hilbert space, then satisfies the ( ) property and is also satisfies the ( ) property for all . These results are also achieved for ( ) property. In addition, we prove that for a polaroid operator with finite ascent then after the property ( ) holds for for all.
Metaheuristic is one of the most well-known fields of research used to find optimum solutions for non-deterministic polynomial hard (NP-hard) problems, for which it is difficult to find an optimal solution in a polynomial time. This paper introduces the metaheuristic-based algorithms and their classifications and non-deterministic polynomial hard problems. It also compares the performance of two metaheuristic-based algorithms (Elephant Herding Optimization algorithm and Tabu Search) to solve the Traveling Salesman Problem (TSP), which is one of the most known non-deterministic polynomial hard problems and widely used in the performance evaluations for different metaheuristics-based optimization algorithms. The experimental results of Ele
... Show More