Preferred Language
Articles
/
EBczEZIBVTCNdQwC2p7B
An efficient selective method for audio watermarking against de-synchronization attacks
...Show More Authors

Scopus
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Electrical Engineering
A Method Combining Compressive Sensing-Based Method of Moment and LU Decomposition for Solving Monostatic RCS
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Chem Tech Research
Synthesis of New Selective Electrodes for the Determination of Metronidazole Benzoate (MNZB) Based on a Molecularly Imprinted Polymer Combined With Poly Vinyl Chloride
...Show More Authors

Publication Date
Wed Jun 07 2023
Journal Name
Journal Of Educational And Psychological Researches
Selective Visual Attention among Students of Colleges of Education At The University Of Mosul
...Show More Authors

The research aims to identify the level of selective visual attention among students of the faculties of education at the University of Mosul. To achieve the goal of the research, the researchers chose a stratified random sample of students from the faculties of education at the University of Mosul for the academic year (2020-2021). The sample size was (652) students from the scientific and humanitarian specializations, the second and fourth stages. The researchers developed a test of multiple-choice to measure the selective visual attention, which consisted of (42) items. The results revealed that the students of the faculties of education for human sciences have an appropriate level of selective visual attention. There are statisticall

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Science
Selective Image Encryption Based on DCT, Hybrid Shift Coding and Randomly Generated Secret Key
...Show More Authors

Most of today’s techniques encrypt all of the image data, which consumes a tremendous amount of time and computational payload. This work introduces a selective image encryption technique that encrypts predetermined bulks of the original image data in order to reduce the encryption/decryption time and the
computational complexity of processing the huge image data. This technique is applying a compression algorithm based on Discrete Cosine Transform (DCT). Two approaches are implemented based on color space conversion as a preprocessing for the compression phases YCbCr and RGB, where the resultant compressed sequence is selectively encrypted using randomly generated combined secret key.
The results showed a significant reduct

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Catalysis Science & Technology
Mechanisms governing selective hydrogenation of acetylene over γ-Mo<sub>2</sub>N surfaces
...Show More Authors

We demonstrate that the selective hydrogenation of acetylene depends on energy profile of the partial and full hydrogenation routes and the thermodynamic stability of adsorbed C2H2 in comparison to C2H4.

View Publication
Scopus (26)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Wed May 10 2017
Journal Name
Journal Of The College Of Languages (jcl)
Factores lingüísticos y extralingüísticos de la evolución semántica de los términos Linguistic and non-linguistic factors of the semantic evolution of terms
...Show More Authors

La disciplina sémantica siendo una rama de la lingüística y relacionada con los significados que residen detrás de los vocablos sería muy intereseante ser estudiada y investigada, sobre todo cuando tratamos de penetrarnos dentro de la evolución semántica y los motivos por los que se suceden estos cambios. Pues, es injusto dejar de dar una definición aclaratoria sobre esta disciplina y sus componentes.

El significado de los léxicos que se forma por un conjunto de semas o rasgos significativos mínimos. Sin embargo, no todos esos semas son igualmente intervenidos por los hablantes de una comunidad lingüística, sino que hay algunos de ellos que siempre están presentes, mientras que otros varían. Es decir, el significado

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of The College Of Languages (jcl)
El porqué de la confusión entre el pretérito indefinido y el imperfecto en la lengua española para alumnos de Irak The reason of confusion between past perfect and imperfect in Spanish for Iraqi students
...Show More Authors

Las diferencias entre el pretérito perfecto simple y el imperfecto son uno de los temas más complejos de la lengua española, no sólo para el estudiante, sino para el profesor, puesto que sistematizar los casos y hacerlos fácilmente comprensibles al alumno es tarea difícil. Los profesores de lengua, cuyas investigaciones han dado lugar a una serie de teorías y de corrientes metodológicas y didácticas que permiten enfocar la enseñanza de una lengua extranjera de manera muy distinta a como se hacía tradicionalmente. Vamos a repasar muy brevemente cuáles son estas teorías.

En primer lugar es necesario señalar en qué consiste el aprendizaje de una segunda lengua:

"El aprendizaje de una segunda lengua (L2) es el

... Show More
View Publication
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2&lt;sup&gt;m&lt;/sup&gt;) using FPGA by exponentiation to (2&lt;sup&gt;k&lt;/sup&gt;)
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2&lt;sup&gt;m&lt;/sup&gt;) using FPGA by exponentiation to (2&lt;sup&gt;k&lt;/sup&gt;)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Feb 06 2020
Journal Name
Scientific Reports
Waste foundry sand/MgFe-layered double hydroxides composite material for efficient removal of Congo red dye from aqueous solution
...Show More Authors
Abstract<p>We aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure</p> ... Show More
Scopus (165)
Crossref (106)
Scopus Clarivate Crossref