Preferred Language
Articles
/
BRcd-Y8BVTCNdQwCdYK9
Approximate Solution of Linear and Nonlinear Partial Differential Equations Using Picard’s Iterative Method
...Show More Authors

Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More
Publication Date
Fri Jan 22 2021
Journal Name
International Journal Of Agricultural & Statistical Sciences
EFFECT OF GROWING MEDIA, NUTRIENT SOLUTION AND CONTROL OF FLOWERING ON THE PRODUCTIVITY OF THE CUCUMBER CULTIVATED BY THE SOILLESS CULTURE.
...Show More Authors

Publication Date
Wed Aug 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On the Riesz Means of Expansions by Riesz Bases Formed by Eigenfunctions for the Ordinary Differential Operator of 4-th Order
...Show More Authors

The aim of this paper is prove a theorem on the Riesz mean of expansions with respect to Riesz bases, which extends the previous results of Loi and Tahir on the Schrodinger operator to the operator of 4-th order.

View Publication Preview PDF
Publication Date
Sun May 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On the Riesz Means of Expansion by Riesz Bases Formed by Eigen Functions for the Ordinary Differential Operator of 2mth Order
...Show More Authors

  The aim of this paper is to prove a theorem on the Riesz means of expansions with respect to Riesz bases, which extends the previous results of [1] and [2] on the Schrödinger operator and the ordinary differential operator of 4-th order to the operator of order 2m by using the eigen functions of the ordinary differential operator. Some Symbols that used in the paper:     the uniform norm. <,>   the inner product in L2. ï‚¶G   the set of all boundary elements of G. ˆ u   the dual function of u.

View Publication Preview PDF
Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
Memorizer Keeper      And his method in his masterpiece      Supervision by the parties
...Show More Authors

What has reached us from this great heritage left by our scientists book ((masterpiece of honor by knowing the parties)) to the conservative privilege, which Imam Safadi said ((Sheikh of time, and the preservation of the era, and critic of the time, if his son Ibn Makola had a drink and eaten, and make it to him So, after trusting in God, I thought that I should write a paper highlighting the life of this great world and explaining its methodology in this useful book in which Imam Ibn Hajar al-Asqalani said: `` The use of it took place east and west, and the scholars competed in collecting it after. And soon)).

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials &amp; Continua
An Efficient Method for Heat Recovery Process and燭emperature燨ptimization
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Feb 16 2017
Journal Name
Signal, Image And Video Processing
Enhancing Prony’s method by nuclear norm penalization and extension to missing data
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref