Modified unsaturated polyester (MUPE) was blended with Cellulose (Cls) and with ethyl cellulose (ECls) at ambient conditions in the presence of ethyl methyl ketone peroxide (EMKP) as hardener. The blends containing different weight percentages (5-25 %) of Cls or ECls. Mechanical properties (impact strength, hardness, and bending) and dielectric constant were determined. The results observed that Cls increases the impact strength, hardness, and dielectric constant and decreases the bending of the MUPS, while ECls causes an increase in the three mechanical behaviours and a decrease in the dielectric constant of the MU-PS.
AS Salman, SK Hameed…, Karbala Journal of Physical Education Sciences, 2020
Background: Helicobacter pylori are important gastrointestinal pathogen associated with gastritis, peptic ulcers, and an increased risk of gastric carcinoma. There are several popular methods for detection of H. pylori (invasive and non-invasive methods) each having its own advantages, disadvantages, and limitations, and by using PCR technique the ability to detect H. pylori in saliva samples offers a potential for an alternative test for detection of this microorganism. Materials and methods: The study sample consists of fifty participants of both genders, who undergo Oesophageo-gastrodudenoscopy at the Gastroenterology Department of Al-Kindy Teaching Hospital Baghdad/ Iraq, during five months period from January 2014 to May 2014. They we
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Digital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.
First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .
&nbs
... Show MoreThe purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators