Preferred Language
Articles
/
9BfhZI4BVTCNdQwCy0Wu
The effect of using a treadmill with different incline angles in developing some functional variables among Diyala University basketball team players
...Show More Authors

تعد لعبة كرة السلة من الألعاب الرياضية التي تحتاج متطلبات بدنية ووظيفية خاصة بها، وذلك من خلال الانتقال داخل الملعب بالكرة أو بدونها والسبل للتخلص من ملاحقة الخصم أثناء الدفاع وكيفية المناورة أثناء الهجوم مع إجادة التصويب بكافة أنواعه داخل الملعب، ومن هنا تكونت مشكلة البحث في كيفية تطوير تلك العوامل الوظيفية والتي لها الأثر في الارتقاء بمستوى أداء اللاعب أثناء اللعب، وعن طريق استخدام الباحثان لطريقة جهاز السير المتحرك وكيفية تنظيم زوايا الميل (الانحدار) على لاعبي كرة السلة لمنتخب جامعة ديالى وذلك للضعف في الأعداد الوظيفي لدى مدربي الكليات.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Communications In Computer And Information Science
Audio Compression Using Transform Coding with LZW and Double Shift Coding
...Show More Authors

Home New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon May 16 2016
Journal Name
Far East Journal Of Mathematical Sciences (fjms)
MINIMIZING WAITING TIMES USING MULTIPLE FUZZY QUEUEING MODEL WITH SUPPLY PRIORITIES
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Parametric Nonlinear Programming Approach with Fuzzy Queues Using Hexagonal Membership Functions
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Mon Feb 25 2019
Journal Name
Iraqi Journal Of Physics
Nuclear level density with proton resonance using Gaussian orthogonal ensemble theory
...Show More Authors

The Gaussian orthogonal ensemble (GOE) version of the random matrix theory (RMT) has been used to study the level density following up the proton interaction with 44Ca, 48Ti and 56Fe.

A promising analysis method has been implemented based on the available data of the resonance spacing, where widths are associated with Porter Thomas distribution. The calculated level density for the compound nuclei 45Sc,49Vand 57Co shows a parity and spin dependence, where for Sc a discrepancy in level density distinguished from this analysis probably due to the spin  misassignment .The present results show an acceptable agreement with the combinatorial method of level density.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Offline Signature Biometric Verification with Length Normalization using Convolution Neural Network
...Show More Authors

Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Administrative competencies in many of Iraqi public Organizations: comparative study.
...Show More Authors

Competencies topic in general , and Administrative competencies in specific, are considered as important subject in the contemporary administrative literature in all countries as well as in public and privet Organizations. For this reason, we have need to study those competencies in many Iraqi Organizations.

Two Organizations wer chosen for this research one of them is the Institution of taxation, and the other is the General company of Electric the data and information related to the research have been collected by desined questioner which has been given to a sample of (50) persions divided eqully between the two maintioned organizations.

The results of the study had differences

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 03 2016
Journal Name
Journal Of Educational And Psychological Researches
School Refusal Behavior of Primary First Class Pupils in Baghdad
...Show More Authors

Objectives: The study aims to assess the school refusal behavior of first class pupils at primary schools and identifying the relationship between the school refusal behavior and some of socio-demographic characteristics for the pupils.

Methodology:  A descriptive-analytic study was initiated from November 1st, 2012 to April 1st, 2013. A random sample of 411 students is selected from a probability stratified sample of 17 primary schools for both sexes in 4 sectors in Baghdad Al-Rasafa and Al-Karkh districts which are selected randomly from first class of primary school. A Self administrative questionnaire (Parents' Version) which constructed by the rese

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 15 2024
Journal Name
مجلة الدراسات المستدامة
Cyberbullying among academically superior students
...Show More Authors

Results: The results summarized two goals, the first goal stipulates (to identify the degree of cyberbullying among academically outstanding students in the middle school stage). To achieve this goal, the researchers applied the research tool (electronic bullying scale) and then extracted the arithmetic mean for the sample of the current research, which amounted to (6.28) with a standard deviation of (4.03). Then the researchers applied the t-test for one sample to identify the significance of the differences between the means. The arithmetic mean for the sample and the hypothetical (theoretical) mean, which amounted to (11.5) degrees, and after applying the T-test for one sample, it was found that the calculated T-value, which amounted to

... Show More
View Publication