Preferred Language
Articles
/
bsj-940
Improvement of the monochrome image hologram by using a random phase and increasing number of Samples
...Show More Authors

This paper present a study about effect of the random phase and expansion of the scale sampling factors to improve the monochrome image hologram and compared it with previous produced others. Matlab software is used to synthesize and reconstruction hologram.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Copy Move Image Forgery Detection using Multi-Level Local Binary Pattern Algorithm
...Show More Authors

Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different

... Show More
Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref
Publication Date
Sun Jan 19 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effect flexibility of the Strategic human resources in improvement operational performance: "Survey study of views of a sample of managers, engineers and technicians in the Baghdad south 2/Station directorate of Electricity"
...Show More Authors

The research attempts to diagnose the level of the effect of human resources flexibility (employees skills flexibility, employees behaviors flexibility, and human resource practice flexibility) in the south al-rusafa directorate of a power  station one of the formations and the Ministry of Electricity, and impact of a range of variables related to the performance operational, namely, (efficiency, effectiveness)recognizing the importance of the subjects studied,& because of the importance of expected results of the field under consideration,researcher selected a sample of size (121) engineers and technicians of workers in the directorate. Was my hypotheses the major search of a relationship and impact between human resources flex

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 14 2020
Journal Name
Progress In Industrial Ecology, An International Journal
3D image reconstruction from its 2D projection - a simulation study
...Show More Authors

A simulation study of using 2D tomography to reconstruction a 3D object is presented. The 2D Radon transform is used to create a 2D projection for each slice of the 3D object at different heights. The 2D back-projection and the Fourier slice theorem methods are used to reconstruction each 2D projection slice of the 3D object. The results showed the ability of the Fourier slice theorem method to reconstruct the general shape of the body with its internal structure, unlike the 2D Radon method, which was able to reconstruct the general shape of the body only because of the blurring artefact, Beside that the Fourier slice theorem could not remove all blurring artefact, therefore, this research, suggested the threshold technique to eliminate the

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
AGENT BASED MONITORING FOR INVESTIGATION PROCESS AND MAINTENANCE IMPROVEMENT
...Show More Authors

Agent technology has a widespread usage in most of computerized systems. In this paper agent technology has been applied to monitor wear test for an aluminium silicon alloy which is used in automotive parts and gears of light loads. In addition to wear test monitoring، porosity effect on
wear resistance has been investigated. To get a controlled amount of porosity, the specimens have
been made by powder metallurgy process with various pressures (100, 200 and 600) MPa. The aim of
this investigation is a proactive step to avoid the failure occurrence by the porosity.
A dry wear tests have been achieved by subjecting three reciprocated loads (1000, 1500 and 2000)g
for three periods (10, 45 and 90)min. The weight difference a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 22 2026
Journal Name
Al–bahith Al–a'alami
The Media and Shaping the Public's Mental Image towards the Transitional Justice
...Show More Authors

Media plays an important role in shaping the mental image of their audiences for individuals, groups and organizations, States and peoples. It is the window through which overlooks the masses on events and issues, and in the light of their exposure to these means are their opinions and impressions.

Despite the importance of direct experiences in shaping opinions, drawing pictures and impressions, it is inevitable to rely on these means as individuals can not engage in direct experiences with thousands of events, issues and topics that concern their community and other societies.

There is no doubt that media is of great importance at the present time, because of its significant impact in the management of the course of pol

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Journal Of Education In Black Sea Region
Discriminatory and Racist Discourse in American TV Channels: The Image of Arab Immigrants
...Show More Authors

The present study examines critically the discursive representation of Arab immigrants in selected American news channels. To achieve the aim of this study, twenty news subtitles have been exacted from ABC and NBC channels. The selected news subtitles have been analyzed within van Dijk’s (2000) critical discourse analysis framework. Ten discourse categories have been examined to uncover the image of Arab immigrants in the American news channels. The image of Arab immigrants has been examined in terms of five ideological assumptions including "us vs. them", "ingroup vs. outgroup", "victims vs. agents", "positive self-presentation vs. negative other-presentation", and "threat vs. non-threat". Analysis of data reveals that Arab immig

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 15 2020
Journal Name
Al-academy
Aesthetics of the Sufi Image and its Representations in Post-Modern Theater Show
...Show More Authors

View Publication
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation
...Show More Authors

The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Al-khwarizmi Engineering Journal
The Remediation of Congo Red-Contaminated Groundwater by using a Permeable Reactive Barrier Through Modified Waterworks Sludge MgAl-LDH
...Show More Authors

This investigation aims to explore the potential of waterworks sludge (WS), low-cost byproduct of water treatment processes, as a sorbent for removing Congo Red (CR) dyes. This will be achieved by precipitating nano-sized (MgAl-LDH)-layered double hydroxide onto the surface of the sludge. The efficiency of utilizing MgAl-LDH to modify waterworks sludge (MWS) for use in permeable reactive barrier technology was confirmed through analysis with Fourier transform infrared and X-ray diffraction. The isotherm model was employed to elucidate the adsorption mechanisms involved in the process. Furthermore, the COMSOL model was utilized to establish a continuous testing model for the analysis of contaminant transport under diverse conditions.

... Show More
View Publication Preview PDF
Scopus Crossref