Preferred Language
Articles
/
Sxbf7YsBVTCNdQwCvOWz
Dominant Ideology in Orwell’s Novel “Animal Farm”: A Critical Discourse Analysis of Selected Extracts
...Show More Authors

MRY *Khalid Sh. Sharhan, *Naseer Shukur Hussein, INTERNATIONAL JOURNAL OF DEVELOPMENT IN SOCIAL SCIENCE AND HUMANITIES, 2021

View Publication
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Multiwavelet and Estimation by Interpolation Analysis Based Hybrid Color Image Compression
...Show More Authors

Nowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band  by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained

View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Use Principal Component Analysis Technique to Dimensionality Reduction to Multi Source
...Show More Authors

This paper tackles with principal component analysis method (PCA ) to dimensionality reduction in the case of linear combinations to digital image processing and analysis. The PCA is statistical technique that shrinkages a multivariate data set consisting of inter-correlated variables into a data set consisting of variables that are uncorrelated linear combination, while ensuring the least possible loss of useful information. This method was applied to a group of satellite images of a certain area in the province of Basra, which represents the mouth of the Tigris and Euphrates rivers in the Shatt al-Arab in the province of Basra.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Mefenamic Acid Selective Membranes Sensor and Its Application to pharmaceutical Analysis
...Show More Authors

PVC membrane sensor for the selective determination of Mefenamic acid (MFA) was constructed. The sensor is based on ion association of MFA with Dodecaphospho molybdic acid (PMA) and Dodeca–Tungstophosphoric acid(PTA) as ion pairs. Nitro benzene (NB) and di-butyl phthalate (DBPH) were used as plasticizing agents in PVC matrix membranes. The specification of sensor based on PMA showed a linear response of a concentration range 1.0 × 10–2 –1.0 × 10–5 M, Nernstian slopes of 17.1-18.86 mV/ decade, detection limit of 7 × 10-5 -9.5 × 10 -7M, pH range 3 – 8 , with correlation coefficients lying between 0.9992 and 0.9976, respectively. By using the ionphore based on PTA gives a concentration range of 1.0 × 10–4 –1.0 × 10–5 M,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Digital Rock Samples Porosity Analysis by OTSU Thresholding Technique Using MATLAB
...Show More Authors

Porosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
Choosing Appropriate Distribution ‏‎by Minitab’s 17 Software to Analysis System Reliability
...Show More Authors

This research aims to choose the appropriate  probability ‎ distribution  ‎‏‎ to the reliability‎        analysis‎ for  an   item through ‎ collected data for operating and stoppage  time of  the case  study.

    Appropriate choice for .probability distribution   is when  the data look to be on or  close the form fitting line for probability plot and test the data  for  goodness of fit .

     Minitab’s 17 software  was used ‎  for this  purpose after  arranging collected data and setting it in the the program‎.

 &nb

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
الأستاذ
Analysis of the content of the chemistry book for the second intermediate grade according to habits of mind In light of the educational reform project (2061)
...Show More Authors

Preview PDF
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
Numerical Analysis of Fluid Flow and Heat Transfer by Forced Convection in Channel with one-sided Semicircular Sections and Filled with Porous Media
...Show More Authors

This research presents a numerical study to simulate the heat transfer by forced convection as a result of fluid flow inside channel’s with one-sided semicircular sections and fully filled with porous media. The study assumes that the fluid were Laminar , Steady , Incompressible and inlet Temperature was less than Isotherm temperature of a Semicircular sections .Finite difference techniques were used to present the governing equations (Momentum, Energy and Continuity). Elliptical Grid is Generated using Poisson’s equations . The Algebraic equations were solved numerically by using (LSOR (.This research studied the effect of changing the channel shapes on fluid flow and heat transfer  in two cases ,the first: cha

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 21 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The influence of shifting the class I cavity position prepared in posterior teeth buccally and lingualy on stress distribution (Finite element analysis study)
...Show More Authors

Background: Rehabilitation of the carious tooth to establish tooth structure integrity required cavity design that show a benign stress distribution. The aim of this study was to investigate the influence of the cavity position on the stress values in the reamining tooth structure restored with amalgam or resin composite. Materials and methods: Seven 2-D models of maxillary first premolar include class I cavity design was prepared, one sound tooth (A) 3 composite (B1, B2, and B3) and 3 amalgam (C1, C2, and C3). In design (BI and C1) the cavity position is in the mid distance between bacc-lingual cusp tip, design (B2 and C2) and (B3 and C3) shifted toward the buccal cusp and the lingual cusp for 0.5 mm respectively. One hundred N vertical

... Show More
View Publication Preview PDF