Twelve pends were selected and distributed on three verticals transects paths on the Tigers river in Al Rasheed county.Passing through land covers, that classified and covers the whole region. Based on the 8 Landsat of the year 2015. It was oriental classified by using Erdas 10.2 . The pedons were distributed on the area of each varicty of these classes. the series of soil according of the transect series (DW74,MMg,DMu6 , Df96) respectively were represented P1 , P2 , P3 , P4 .
The second transits series(DM97,MM5,DM96,DF115) respectively were represented P5 , P6 , P7 , P8 .The third transits series(DM46,MMg,MF12,MM11) re
... Show MoreA simple indirect spectrophotometric method for determination of mebendazol in pure and pharmaceutical formulation was presented in this study. UV-Visible spectrophotometry using the optimal conditions was developed for determination of mebendazole in pure drug and different preparation samples. The method is based on the oxidation of drug by nbromosuccinimide with hydrochloric acid and the left amount of oxidizing agent was determined by the reaction with tartarazine and the absorbance was measured at 428 nm. Calibration curves were linear in the range of 5 to 30 µg.mL-1 with molar absorptivity 8437.2 L.mol-1 .cm-1 . The limits of detection and quantification were determined and found to be 0.7770 µg.mL-1 and 2.3400 µg.mL-1 respec
... Show MoreExpressions of Gratitude in American English and Iraqi Arabic (). Expressing gratitude is one of the most frequently occurring communicative acts in...
Background: The demand for better esthetic during orthodontic treatment has increased nowadays, so orthodontists starting using esthetic arch wires, brackets and ligatures.Tooth colored brackets were introduced in different types of materials. Sapphire ceramic brackets are one type of esthetic brackets and their color stability remains the main concern for the clinicians and patients at the same time. The present study design to evaluate the effect of three different staining materials (pepsi, black tea and cigarette smoke) on the stainability of sapphire ceramic brackets bonded with three types of light cure orthodontic adhesives which include: Resilience, Enlight and Transbond. Materials and Methods: The sample consisted of three hundre
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Color image compression is a good way to encode digital images by decreasing the number of bits wanted to supply the image. The main objective is to reduce storage space, reduce transportation costs and maintain good quality. In current research work, a simple effective methodology is proposed for the purpose of compressing color art digital images and obtaining a low bit rate by compressing the matrix resulting from the scalar quantization process (reducing the number of bits from 24 to 8 bits) using displacement coding and then compressing the remainder using the Mabel ZF algorithm Welch LZW. The proposed methodology maintains the quality of the reconstructed image. Macroscopic and
The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show More