Preferred Language
Articles
/
ERZPgYcBVTCNdQwCgFSg
Iris recognition using localized Zernike features with partial iris pattern
...Show More Authors

Publication Date
Wed Jul 03 2013
Journal Name
Eur. Chem. Bull
PREPARATION AND CHARACTERIZATION OF UNSATURATED POLYESTER MATERIAL BLENDED WITH CELLULOSE AND WITH ETHYL CELLULOSE.
...Show More Authors

Modified unsaturated polyester (MUPE) was blended with Cellulose (Cls) and with ethyl cellulose (ECls) at ambient conditions in the presence of ethyl methyl ketone peroxide (EMKP) as hardener. The blends containing different weight percentages (5-25 %) of Cls or ECls. Mechanical properties (impact strength, hardness, and bending) and dielectric constant were determined. The results observed that Cls increases the impact strength, hardness, and dielectric constant and decreases the bending of the MUPS, while ECls causes an increase in the three mechanical behaviours and a decrease in the dielectric constant of the MU-PS.

Publication Date
Sat May 02 2020
Journal Name
Karbala Journal Of Physical Education Sciences
The effect of using a designed device to develop the technical performance of the descending landing skill facing with half a cycle on the parallel device of the technical men's
...Show More Authors

AS Salman, SK Hameed…, Karbala Journal of Physical Education Sciences, 2020

View Publication
Publication Date
Sat Jan 24 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Establishment of the possible association between the presence of Helicobacter pylori in the saliva and gastric biopsy by using polymerase chain reaction technique in association with oral manifestation of peptic ulcer disease
...Show More Authors

Background: Helicobacter pylori are important gastrointestinal pathogen associated with gastritis, peptic ulcers, and an increased risk of gastric carcinoma. There are several popular methods for detection of H. pylori (invasive and non-invasive methods) each having its own advantages, disadvantages, and limitations, and by using PCR technique the ability to detect H. pylori in saliva samples offers a potential for an alternative test for detection of this microorganism. Materials and methods: The study sample consists of fifty participants of both genders, who undergo Oesophageo-gastrodudenoscopy at the Gastroenterology Department of Al-Kindy Teaching Hospital Baghdad/ Iraq, during five months period from January 2014 to May 2014. They we

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Image Zooming Using Inverse Slantlet Transform
...Show More Authors

Digital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.

      First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the   signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by  box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .

  &nbs

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Reinforce organizational communication using Information Technology
...Show More Authors
Abstract<p>The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 03 2024
Journal Name
The Science Teacher
Using Scenarios to Assess Student Learning
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref