Preferred Language
Articles
/
0hd1OI8BVTCNdQwCBWOh
The Use of Biorthogonal Wavelet, 2D Polynomial and Quadtree to Compress Color Images
...Show More Authors

In this paper, a compression system with high synthetic architect is introduced, it is based on wavelet transform, polynomial representation and quadtree coding. The bio-orthogonal (tap 9/7) wavelet transform is used to decompose the image signal, and 2D polynomial representation is utilized to prune the existing high scale variation of image signal. Quantization with quadtree coding are followed by shift coding are applied to compress the detail band and the residue part of approximation subband. The test results indicate that the introduced system is simple and fast and it leads to better compression gain in comparison with the case of using first order polynomial approximation.

Scopus Crossref
View Publication
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Investment Perspective According to Behavioral Finance Science
...Show More Authors

The first thing that comes to mind is the highly important question of whether there were some effects of human behavior and its fluctuations on the theories of the efficient market and the contemporary investment portfolio. According to what has been said by the proponents of these two theories; when the optimal return is realized, the efficiency of the market is achieved in terms of perfect information on prices and risk that supposed to be predetermined in a rational way.

he other question that imposed here is “at what time people should be rational in their investments in the security markets ?”. This means that investors are rational for their efforts devoted to utility maximization, which are p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Benford’s Law to detect Financial Fraud
...Show More Authors

Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Oct 30 2008
Journal Name
College Of Islamic Sciences
Luqman's commandments to his son: Objective study
...Show More Authors

God  urged to read the Holy Qur’an and to ponder it is commanded, and the Most High said:  That they ponder over His verses and that those with insights remember ().
And this book that God Almighty sent down to the heart of His Prophet, peace and blessings be upon him, is as clear as the sun and the moon.
It is a book of guidance and the constitution of a nation that is the best nation brought forth for mankind, and God has taken care of its preservation as He said:  We have sent down the Remembrance, and we are its guardians.
This has been chosen for this topic (Luqman's commandments to his son) for what we see today in our time and society from the loss of morals and values and the neglect of parents to their chi

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Aug 23 2021
Journal Name
Reviews In Chemical Engineering
Molybdenum nitrides from structures to industrial applications
...Show More Authors

Owing to their remarkable characteristics, refractory molybdenum nitride (MoN x )-based compounds have been deployed in a wide range of strategic industrial applications. This review reports the electronic and structural properties that render MoN x materials as potent catalytic surfaces for numerous chemical reactions and surveys the syntheses, procedures, and catalytic applications in pertinent industries such as the petroleum industry. In particular, hydrogenation, hydrodesulfurization, and hydrodeoxygenation are essential processes in the refinement of oil segments and their conversions into commodity fuels and platform chemicals. N-vacant sites over a catalyst’s surface are a significant driver of diverse chemical phenomena. Studies

... Show More
Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Hyperstructures
HYPER STRUCTURE THEORY APPLIED TO KU-ALGEBRAS
...Show More Authors

In this paper, the concept of a hyper structure KU-algebra is introduced and some related properties are investigated. Also, some types of hyper KU-algebras are studied and the relationship between them is stated. Then a hyper KU-ideal of a hyper structure KU-algebra is studied and a few properties are obtained. Furthermore, the notion of a homomorphism is discussed.

Publication Date
Sun Jan 01 2023
Journal Name
Physical Mesomechanics Of Condensed Matter: Physical Principles Of Multiscale Structure Formation And The Mechanisms Of Nonlinear Behavior: Meso2022
Optimal control strategy applied to diabetes model
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Target cost tool to achieve competitive advantage
...Show More Authors

Target costing is one of the modern techniques in strategic Management accounting, Is has shown active adoption to changes in current business environments, In addition, is has seen a growth in strategic approach, The goal of using target costing is to build and strengthen competition abilities of economic units through introducing appropriate ways to decrease cost values while maintaining and improving quality of product, So this study is aim to show how can  economic units use target costing to achieve competitive advantages .

 

View Publication Preview PDF
Crossref
Publication Date
Mon Aug 23 2021
Journal Name
Reviews In Chemical Engineering
Molybdenum nitrides from structures to industrial applications
...Show More Authors

Owing to their remarkable characteristics, refractory molybdenum nitride (MoNx)-based compounds have been deployed in a wide range of strategic industrial applications. This review reports the electronic and structural properties that render MoNx materials as potent catalytic surfaces for numerous chemical reactions and surveys the syntheses, procedures, and catalytic applications in pertinent industries such as the petroleum industry. In particular, hydrogenation, hydrodesulfurization, and hydrodeoxygenation are essential processes in the refinement of oil segments and their conversions into commodity fuels and platform chemicals. N-vacant sites over a catalyst’s surface are a significant driver of diverse chemical phenomena. Studies on

... Show More
View Publication
Scopus (19)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Thu Dec 28 2023
Journal Name
Al–bahith Al–a'alami
The Self and the Other in the Dogmatic Discourse: The Cognitive and Emotional Structure of the Authoritarian and Destructive Personality
...Show More Authors

The philosopher and social psychologist Erich Fromm (1900-1980), in his book "Escape from Freedom" highlighted the distinction between the "I" of the authoritarian personality and the "I" of the destructive personality based on their stance towards "the other." The former (the authoritarian self) relies on a submissive, enslaving formula, where the "I" is the master/dominator/controller/strong, while "the other" is the servant/submissive/controlled/weak, essential for perpetuating this formula. In contrast, the latter (the destructive self) relies on an annihilating, negating formula, where the "I" is existence/killer/destroyer/pe

... Show More
View Publication Preview PDF
Crossref