Preferred Language
Articles
/
EBczEZIBVTCNdQwC2p7B
An efficient selective method for audio watermarking against de-synchronization attacks
...Show More Authors

Scopus
View Publication
Publication Date
Sat Oct 01 2022
Journal Name
Journal Of Pakistan Association Of Dermatologists
Zinc as an essential element for normal immune reactions and as a therapeutic agent for autoimmune diseases
...Show More Authors

Scopus (1)
Scopus
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Test the effectiveness of Method EMDR
...Show More Authors

Our country faced lots of crises specially Wars and still living under the traumatic events. This would result in psychological disorder specially the Acute Stress Disorder (ASD). That’s if not treated, it will turn to be over Post Traumatic Stress Disorder(PTSD). Also not mentioning the shortage of recourses speaks about war and crises. That treat with its inflections psychologically and sociologically theses cases if happened.

The importance of this study arise through it is objective to introduce a program for EMDR which give benefit for treat in health, social, educational institutes.

Aims:

The objective of this Study is the identification of a Test the effectiveness of Eye Movement Desensi

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 21 2023
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees22fr
Study of the x-ray diffraction lines of calcium titanate nanoparticle using SSP method and Scherrer method
...Show More Authors

In this study, the modified size-strain plot (SSP) method was used to analyze the x-ray diffraction lines pattern of diffraction lines (1 0 1), (1 2 1), (2 0 2), (0 4 2), (2 4 2) for the calcium titanate(CaTiO3) nanoparticles, and to calculate lattice strain, crystallite size, stress, and energy density, using three models: uniform (USDM). With a lattice strain of (2.147201889), a stress of (0.267452615X10), and an energy density of (2.900651X10-3 KJ/m3), the crystallite was 32.29477611 nm in size, and to calculate lattice strain of Scherrer (4.1644598X10−3), and (1.509066023X10−6 KJ/m3), a stress of(6.403949183X10−4MPa) and (26.019894 nm).

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Solving Whitham-Broer-Kaup-Like Equations Numerically by using Hybrid Differential Transform Method and Finite Differences Method
...Show More Authors

This paper aims to propose a hybrid approach of two powerful methods, namely the differential transform and finite difference methods, to obtain the solution of the coupled Whitham-Broer-Kaup-Like equations which arises in shallow-water wave theory. The capability of the method to such problems is verified by taking different parameters and initial conditions. The numerical simulations are depicted in 2D and 3D graphs. It is shown that the used approach returns accurate solutions for this type of problems in comparison with the analytic ones.

View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
EL ANÁLISIS DE ERRORES DEL LEÍSMO Y LAÍSMO EN EL PAPEL DIDÁCTICO PARA LOS ALUMNOS DEL DEPARTAMENTO ESPAÑOLEN LA FACULTAD DE LENGUAS EN IRAK Search Summary: The analysis of the mistakes of the personal pronouns in effect replaces him in the
...Show More Authors

During the educational practices in the Spanish department at the Faculty of Languages ​​, University of Baghdad , we noticed that the personal pronouns in effect replaced by the direct and indirect characterized hardly be expressed , and the difficulty of her education.

Rationale: I chose this topic because the personal pronouns differ between the Spanish language and the Arabic language. We believe that this study may be useful not only for language teachers, but also for students, because it can contribute to a greater awareness of and correct weaknesses.

Objectives: To apply the model from which to address the problems in the use of personal pronouns Spanish , and the difference between effect of direct and indire

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Parental Oral Violence against Their Teen- ager Children and its Relation with Some Variables: Parental Oral Violence against Their Teen- ager Children and its Relation with Some Variables
...Show More Authors

Abstract
The Verbal Violence that is directed towards sons is considered one of
the dehavioural problems that have negative reflections on the personality
of the individual . the increase in the frequency and intensity of that
behavior in the daily life may lead to psychological and behavioural
disturbances, and such behaviourhas to be stooped in an early time before it

leave negative affects on the personality of the teenager which will not be
cured or removed easily .
The family that is represented by the parents has a prominent effect In the
shaping of the teenager's personality , hence forth the normal teenage is
a reflection of a stable family life , relatively empty of disturbances and
unbalanc

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 10 2020
Journal Name
Journal Of Arts, Literature, Humanities And Social Sciences
Análisis de los textos deportivos españoles y su traducción al تحليل النصوص الرياضية الاسبانية و ترجمتها الى العربية
...Show More Authors

View Publication