Preferred Language
Articles
/
-RcX7I4BVTCNdQwC2FkB
The impact of applying the K-W-L self-scheduling technique on first-year intermediate students' learning of basic volleyball skills
...Show More Authors

The impact of applying the K-W-L self-scheduling technique on first-year intermediate students' learning of basic volleyball skills, Ayad Ali Hussein*, Israa Fouad Salih

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Political Sciences Journal
Political events in Iraq after 2003 and the impact of belonging and awareness in contemporary Iraqi composition
...Show More Authors

الاحداث السياسية في العراق بعد 2003 وأثر الانتماء والوعي في التشكيل العراقي المعاصر

View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Iop Conference Series: Earth And Environmental Science
A study Some Technical Indicators Under Impact Tillage Depth and Disk harrow Angle of the Compound Machine
...Show More Authors
Abstract<p>The research included studying the effect of different plowing depths (10,20and30) cm and three angles of the disc harrows (18,20and25) when they were combined in one compound machine consisting of a triple plow and disc harrows tied within one structure. Draft force, fuel consumption, practical productivity, and resistance to soil penetration. The results indicated that the plowing depth and disc angle had a significant effect on all studied parameters. The results showed that when the plowing depth increased and the disc angle increased, leads to increased pull force ratio, fuel consumption, resistance to soil penetration, and reduce the machine practical productivity.</p>
View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2&lt;sup&gt;m&lt;/sup&gt;) using FPGA by exponentiation to (2&lt;sup&gt;k&lt;/sup&gt;)
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2&lt;sup&gt;m&lt;/sup&gt;) using FPGA by exponentiation to (2&lt;sup&gt;k&lt;/sup&gt;)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Spectral Technique for Baud Time Estimation
...Show More Authors

A new approach for baud time (or baud rate) estimation of a random binary signal is presented. This approach utilizes the spectrum of the signal after nonlinear processing in a way that the estimation error can be reduced by simply increasing the number of the processed samples instead of increasing the sampling rate. The spectrum of the new signal is shown to give an accurate estimate about the baud time when there is no apriory information or any restricting preassumptions. The performance of the estimator for random binary square waves perturbed by white Gaussian noise and ISI is evaluated and compared with that of the conventional estimator of the zero crossing detector.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Mon Jan 02 2012
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Image encryption technique using Lagrange interpolation
...Show More Authors

Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of the Banking Capital on Finance Fixed Assets of the Bank: An Applied Study on a Sample of Iraqi Private Banks
...Show More Authors

To the Banks capital several uses, including the protection of deposits and this was approved by the Basel Committee, And Finance long-term investments which intended to investment in fixed assets that are essential to the continuation of banking activity, Fixed assets not financed from the funds of the deposit, but the owner equity do this jop. the current research tries to prove the effect of banks capital on fixed assets for a sample of iraqi private banks (bank of baghdad and Iraqi middle east Investment bank), for the period from 2011 until 2014. The research concluded that the capital of bank of baghdad affect on his total fixed assets by (84%), and the capital of Iraqi middle east Investment bank affect on his total fixed assets b

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 18 2022
Journal Name
Journal Of The College Of Basic Education
A (k,ℓ) Span in Three Dimensional Projective Space PG(3,p) Over Galois Field where p=4
...Show More Authors

الغرض من هذا العمل هو دراسة الفضاء الإسقاطي ثلاثي الأبعاد PG (3، P) حيث p = 4 باستخدام المعادلات الجبرية وجدنا النقاط والخطوط والمستويات وفي هذا الفضاء نبني (k، ℓ) -span وهي مجموعة من خطوط k لا يتقاطع اثنان منها. نثبت أن الحد الأقصى للكمال (k، ℓ) -span في PG (3،4) هو (17، ℓ) -span ، وهو ما يساوي جميع نقاط المساحة التي تسمى السبريد.

View Publication
Crossref (1)
Crossref