Preferred Language
Articles
/
3hcGMI8BVTCNdQwC3V4N
Block-based Image Steganography for Text Hiding Using YUV Color Model and Secret Key Cryptography Methods
...Show More Authors

Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
CALCULATION BIASES FOR COEFFICIENTS AND SCALE PARAMETER FOR LINEAR (TYPE 1) EXTREME VALUE REGRESSION MODEL FOR LARGEST VALUES
...Show More Authors

Abstract

Characterized by the Ordinary Least Squares (OLS) on Maximum Likelihood for the greatest possible way that the exact moments are known , which means that it can be found, while the other method they are unknown, but approximations to their biases correct to 0(n-1) can be obtained by standard methods. In our research expressions for approximations to the biases of the ML estimators (the regression coefficients and scale parameter) for linear (type 1) Extreme Value Regression Model for Largest Values are presented by using the advanced approach depends on finding the first derivative, second and third.

View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Al–bahith Al–a'alami
Indicators of Mental image among Students of the University of Baghdad about Iraqi Political Parties-(a research based on a master thesis)
...Show More Authors

Media studies have focused mostly on the issue of the mental image because the image that is formed in the mind has become not only a photo of a human being and having kept for himself. This image has an outside influence which may sometimes up to the formation of the fate of others and it sometimes includes individuals and groups together.
This study comes in the context of identifying the image of Iraqi political parties among Iraqi university students and the nature of the view that students have in their minds about these parties.
Chapter one includes the problem of the research, the importance of the study, the goals and method used. Chapter two is divided into two sections: section one deals with the concept of the mental i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
On Bayesian Estimation of System Reliability in Stress – Strength Model Based on Generalized Inverse Rayleigh Distribution
...Show More Authors
Abstract<p>The parameter and system reliability in stress-strength model are estimated in this paper when the system contains several parallel components that have strengths subjects to common stress in case when the stress and strengths follow Generalized Inverse Rayleigh distribution by using different Bayesian estimation methods. Monte Carlo simulation introduced to compare among the proposal methods based on the Mean squared Error criteria.</p>
View Publication
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Mon May 04 2020
Journal Name
Offshore Technology Conference
Hydrate Equilibrium Model for Gas Mixtures Containing Methane, Nitrogen and Carbon Dioxide
...Show More Authors
Abstract<p>Gas hydrate formation is considered one of the major problems facing the oil and gas industry as it poses a significant threat to the production, transportation and processing of natural gas. These solid structures can nucleate and agglomerate gradually so that a large cluster of hydrate is formed, which can clog flow lines, chokes, valves, and other production facilities. Thus, an accurate predictive model is necessary for designing natural gas production systems at safe operating conditions and mitigating the issues induced by the formation of hydrates. In this context, a thermodynamic model for gas hydrate equilibrium conditions and cage occupancies of N2 + CH4 and N2 + CO4 gas mix</p> ... Show More
View Publication
Crossref (7)
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
2013 Ieee International Conference On Circuits And Systems (iccas)
Improved undetected error probability model for JTEC and JTEC-SQED coding schemes
...Show More Authors

The undetected error probability is an important measure to assess the communication reliability provided by any error coding scheme. Two error coding schemes namely, Joint crosstalk avoidance and Triple Error Correction (JTEC) and JTEC with Simultaneous Quadruple Error Detection (JTEC-SQED), provide both crosstalk reduction and multi-bit error correction/detection features. The available undetected error probability model yields an upper bound value which does not give accurate estimation on the reliability provided. This paper presents an improved mathematical model to estimate the undetected error probability of these two joint coding schemes. According to the decoding algorithm the errors are classified into patterns and their decoding

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Journal Of The College Of Education For Women
Apply the gravity model for trips between Najaf center and its settlements
...Show More Authors

The study showed flow rates and the interaction between the settlements served by applying the model of gravity theory to measure depending on the number of the population between city Najaf and the rest of the other settlements served and using three functions of disability, time and cost, as recorded an increase in the interaction index with some settlements like them Kufa, Abbasid and Manathira, while the indicator contrast was in other settlements, either when the application of the gravity model depending on trips and socio-economic characteristics accuracy rate was more pronounced.

View Publication Preview PDF
Publication Date
Tue Jul 01 2025
Journal Name
Journal Of Studies In Humanities And Educational Sciences
The Effect of the Needham Constructivist Model on the Achievement of Third Year Biology Department Students in the Subject of Teaching Methods
...Show More Authors

The current research aims to know the effect of Needham's constructivist model on the achievement of third-year students in the Life Sciences Department in the teaching methods subject. To achieve the research objectives, the experimental method was followed for the experimental and control groups with dimensional measurement of the achievement variable of the teaching methods subject. The research sample included (62) students in the third year of the Life Sciences Department, distributed into two equal groups in the variables (self-assessment of learning methods - chronological age in years - intelligence level - previous information). To measure the level of students' achievement, an achievement test was constructed consisting of (40) te

... Show More
Publication Date
Wed Dec 15 2021
Journal Name
Journal Of Baghdad College Of Dentistry
Root and Root Canal Morphology: Study Methods and Classifications
...Show More Authors

Background: Morphology of the root canal system is divergent and unpredictable, and rather linked to clinical complications, which directly affect the treatment outcome. This objective necessitates continuous informative update of the effective clinical and laboratory methods for identifying this anatomy, and classification systems suitable for communication and interpretation in different situations. Data: Only electronic published papers were searched within this review. Sources: “PubMed” website was the only source used to search for data by using the following keywords "root", "canal", "morphology", "classification". Study selection: 153 most relevant papers to the topic were selected, especially the original articles and review pa

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (7)
Scopus Crossref
Publication Date
Fri Jul 07 2017
Journal Name
International Journal Of Science And Research (ijsr)
Automatic brain tumor segmentation from MRI Images using superpixels based split and Merge algorithm
...Show More Authors

RA Ali, LK Abood, Int J Sci Res, 2017 - Cited by 2

View Publication
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Crossref