Preferred Language
Articles
/
CxYplocBVTCNdQwCiVeM
Studying Hueckel edge detector using binary step edge image
...Show More Authors

Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Engineering
Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl
...Show More Authors

It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL). This HDL program is then used to configure an FPGA to implement the designed circuit.

Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Preparation of Unsaturated Polyester Nanocomposites and Studying Their Mechanical Properties Using some Inorganic Additives
...Show More Authors

In this study three inorganic nano additives, namely; CaCO3, Al2O3 and SiO2 were used to prepare nanocomposites of unsaturated polyester in order to modify their mechanical properties, i.e. tensile strength, elongation, impact and hardness. The results indicated that all the three additives were effective to improve the mechanical properties up to 4% by weight. The effectiveness of them follows the order : CaCO3 > Al2O3 > SiO2 This is due to their particle size in which CaCO3 (13nm), Al2O3 (20-30nm) and SiO2 (15-20nm).

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Studying the ability of transformation of lymphocytes by using PHA in patient with Cytomegalovirus
...Show More Authors

Blood samples were collected from (31) pregnant women infected with cytomegalovirus , also (15) blood samples were collected from congenitally infected infants, and (20),(15),(15) blood samples were collected from pregnant women ,non pregnant and infants, respectively, all of them were as control groups. CMV infection identified by using ELISA assay to detect specific CMV IgM & IgG in sera. The results of lymphocyte transformation showed a significant decrease when phytoheamagglutinin (PHA) used as stimulator, lymphocytes response in infected pregnant women was lower than that of non infected pregnant women as well as non pregnant women. Result also showed a significant decrease in the ability of lymphocyte division in healthy pregnant w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Polyaniline Nano Films Synthesis in One Step via Chemical Oxidative Polymerization
...Show More Authors

Polyaniline films were successfully synthesized in this study using an oxidative polymerization method at temperatures ranging from 0 to 4 ° C. Polyaniline films were deposited using a single step of chemical oxidative polymerization rather than electrochemical polymerization. The polyaniline was examined using FTIR, XRD, SEM, AFM, and Four Point Probe. This result demonstrates that polyaniline synthesized using this method has a uniform morphology, small size (17 to 40) nm, high crystallinity, and high conductivity (9.42 s/cm).

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Measurement of Uranium Concentrations in soil of some regions in south east of Baghdad using nuclear track detector (CR-39)
...Show More Authors

???? ?? ??? ????? ???? ?????? ?????????? ????? ??????? ???? ?????? ????? ??? ??? ????? ?? ???? ??? ????? ????? ???? ????? ????? ?? 0-3cm, 10cm, 20cm, 30cm, 40cm ???????? ????? ?? ???? ????? ???????? ?? ???? ????? ?????? CR-39??????? ?? ??? ??? ?????????? ???????????? ???????? ???? n.cm-2.s-1 5 x 103?? ?????? ?????????? Am241- Be??? ???? ??????? ????????? ??? ?? ???? ????? ?????????? ??? ?? ????? ??????? ?????? 0.881±0.086??? ?? ??????? ????? ??? ????? ??? ?? ????? ????? ??? ???????? ???0.441±0.036 ??? ?? ???????

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 07 2022
Journal Name
Journal Of Nuclear Engineering And Radiation Science
Radon and Exhalation Rate Measurement of Soil Samples in Al-Amiriya Area in Baghdad Governorate Using a Nuclear Track Detector
...Show More Authors
Abstract<p>Radon is the most dangerous natural radioactive component affecting the human population, since it is a radioactive gas that results from the decomposition process of uranium deposits in soil, rocks, and water, and it is damaging both humans and the ecosystem. The radon concentrations and exhalation rate in soil samples from various locations were determined using a passive approach with a CR-39 (CR-39 is Columbia Resin #39; it is allyl diglycol carbonate C12H18O7) detector in Amiriya region in Baghdad Governorate. The average values of radon concentrations are ranged from 47.3 to 54.2 Bq·m−3. From the obtained results, we can conclude that the values of all studied locations are</p> ... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Dec 24 2021
Journal Name
Journal Of Engineering Science And Technology. Journal Of Engineering Science And Technology
Grey-Level Image Compression Using 1-D Polynomial and Hybrid Encoding Techniques
...Show More Authors

Scopus (5)
Scopus
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Image Compression Using Tap 9/7 Wavelet Transform and Quadtree Coding Scheme
...Show More Authors

This paper is concerned with the design and implementation of an image compression method based on biorthogonal tap-9/7 discrete wavelet transform (DWT) and quadtree coding method. As a first step the color correlation is handled using YUV color representation instead of RGB. Then, the chromatic sub-bands are downsampled, and the data of each color band is transformed using wavelet transform. The produced wavelet sub-bands are quantized using hierarchal scalar quantization method. The detail quantized coefficient is coded using quadtree coding followed by Lempel-Ziv-Welch (LZW) encoding. While the approximation coefficients are coded using delta coding followed by LZW encoding. The test results indicated that the compression results are com

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Change detection of remotely sensed image using NDVI subtractive and classification methods.
...Show More Authors

Change detection is a technology ascertaining the changes of
specific features within a certain time Interval. The use of remotely
sensed image to detect changes in land use and land cover is widely
preferred over other conventional survey techniques because this
method is very efficient for assessing the change or degrading trends
of a region. In this research two remotely sensed image of Baghdad
city gathered by landsat -7and landsat -8 ETM+ for two time period
2000 and 2014 have been used to detect the most important changes.
Registration and rectification the two original images are the first
preprocessing steps was applied in this paper. Change detection using
NDVI subtractive has been computed, subtrac

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref