Preferred Language
Articles
/
RxbaCocBVTCNdQwCWDJt
Distributed t-way test suite data generation using exhaustive search method with map and reduce framework
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of the accuracy of a fifth generation apex locator (in vitro study)
...Show More Authors

Background: The use of electronic apex locators for working length determination eliminates many of the problems associated with the radiographic measurements (interference of anatomical structures, errors in projection such as elongation or shortening, and lack of three-dimensional representation). Its most important advantage over radiography is that it measures the length of the root canal to the apical constriction, not to the radiographic apex. The aim of this study was to assess the accuracy of a new fifth generation apex locator (Joypex 5) in recording the apical constriction and comparing it with a third generation apex locator (Root ZX) in vitro. Materials and method: Twenty four single-rooted sound human premolars, extracted for t

... Show More
Preview PDF
Publication Date
Thu Mar 22 2018
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Assessment of medical solid waste generation rates for teaching hospitals in Baghdad city
...Show More Authors

Publication Date
Thu Jun 15 2017
Journal Name
International Journal Of Computer Applications
Analytical and Numerical Study of the Temperature Distribution for a Solid Sphere subjected to a Uniform Heat Generation
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Tue Mar 03 2009
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of repetitive estimation methodsSelf-data
...Show More Authors

In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation)  structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of  these procedures and compare them using generated data.

View Publication Preview PDF
Crossref
Publication Date
Tue Apr 24 2018
Journal Name
International Journal Of Engineering Technologies And Management Research
MODELING CITY PULSATION VIA MOBILE DATA
...Show More Authors

In this study, the mobile phone traces concern an ephemeral event which represents important densities of people. This research aims to study city pulse and human mobility evolution that would be arise during specific event (Armada festival), by modelling and simulating human mobility of the observed region, depending on CDRs (Call Detail Records) data. The most pivot questions of this research are: Why human mobility studied? What are the human life patterns in the observed region inside Rouen city during Armada festival? How life patterns and individuals' mobility could be extracted for this region from mobile DB (CDRs)? The radius of gyration parameter has been applied to elaborate human life patterns with regards to (work, off) days for

... Show More
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Multilayer Perceptron for analyzing satellite data
...Show More Authors

Different ANN architectures of MLP have been trained by BP and used to analyze Landsat TM images. Two different approaches have been applied for training: an ordinary approach (for one hidden layer M-H1-L & two hidden layers M-H1-H2-L) and one-against-all strategy (for one hidden layer (M-H1-1)xL, & two hidden layers (M-H1-H2-1)xL). Classification accuracy up to 90% has been achieved using one-against-all strategy with two hidden layers architecture. The performance of one-against-all approach is slightly better than the ordinary approach

View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Communications
SDN Implementation in Data Center Network
...Show More Authors

View Publication
Scopus (18)
Crossref (14)
Scopus Crossref
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Data visualization and distinct features extraction of the comet Ison 2013
...Show More Authors

The distribution of the intensity of the comet Ison C/2013 is studied by taking its histogram. This distribution reveals four distinct regions that related to the background, tail, coma and nucleus. One dimensional temperature distribution fitting is achieved by using two mathematical equations that related to the coordinate of the center of the comet. The quiver plot of the gradient of the comet shows very clearly that arrows headed towards the maximum intensity of the comet.

View Publication Preview PDF
Crossref