Preferred Language
Articles
/
HhYxlocBVTCNdQwCCFco
Satellite Images Unsupervised Classification Using Two Methods Fast Otsu and K-means
...Show More Authors

Publication Date
Tue May 01 2018
Journal Name
International Journal Of Computer Trends And Technology
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
The Calculation and Analysis of the Total Electron Content Over Different Latitudes and Seasons Using the Numerical Trapezoidal and Simpson Methods
...Show More Authors

It has been shown in ionospheric research that calculation of the total electron content (TEC) is an important factor in global navigation system. In this study, TEC calculation was performed over Baghdad city, Iraq, using a combination of two numerical methods called composite Simpson and composite Trapezoidal methods. TEC was calculated using the line integral of the electron density derived from the International reference ionosphere IRI2012 and NeQuick2 models from 70 to 2000 km above the earth surface. The hour of the day and the day number of the year, R12, were chosen as inputs for the calculation techniques to take into account latitudinal, diurnal and seasonal variation of TEC. The results of latitudinal variation of TE

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Physical Chemistry Research
Thermophysical Study of Ethylene Glycol + H2O and Ethylene Glycol + (DMF/H2O) at 298.15 K
...Show More Authors

In this research, some thermophysical properties of ethylene glycol with water (H2O) and two solvent mixtures dimethylformamide/ water (DMF + H2O) were studied. The densities (ρ) and viscosities (η) of ethylene glycol in water and a mixed solvent dimethylformamide (DMF + H2O) were determined at 298.15 K, t and a range of concentrations from 0.1 to1.0 molar. The ρ and η values were subsequently used to calculate the thermodynamics of mixing including the apparent molar volume (ϕv), partial molar volume (ϕvo) at infinite dilution. The solute-solute interaction is presented by Sv results from the equation ∅_v=ϕ_v^o+S_v √m. The values of viscosity (B) coefficients and Falkenhagen coefficient(A) of the Jone-Dole equation and Gibbs fre

... Show More
Preview PDF
Publication Date
Fri May 06 2016
Journal Name
Journal Of The College Of Basic Education
Some Thermodynmic Properties of binary Mixtures of Alcohol isomers and Sulfolane at 298.15 K
...Show More Authors

Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Pathogenicity of Carbapenems and Third Generation Cephalosporins Resistant K. pneumoniae in Murine Urinary System
...Show More Authors

One hundred and nine clinical lactose fermenter isolates were collected from different samples (urine, stool, wound swab, blood, and sputum) , in a period from February 2014 till May 2014. All samples gathered from Alyarmok laboratories, Alkadimiya laboratories, and Baghdad teaching laboratories which are situated at Baghdad city. Fifty three (48,62%) isolates were identified as Klebsiella pneumoniae depending on microscopic characterization , conventional biochemical tests and then the identification confirmed with API 20E system . The rest of 56(51, 38%) isolates represented other bacteria.Susceptibility test was achieved to all fifty-three K. pneumoniae isolates using five antibiotic disks (Ceftazidime, Ceftriaxone, Cefotaxime, Imipen

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Simulation of Two Phase Flow Mixing Co – Current in T Junction Using Comsol
...Show More Authors

The analysis, behavior of two-phase flow incompressible fluid in T-juction is done by using "A Computational Fluid Dynamic (CFD) model" that application division of different in industries. The level set method was based in “Finite Element method”. In our search the behavior of two phase flow (oil and water) was studed. The two-phase flow is taken to simulate by using comsol software 4.3. The multivariable was studying such as velocity distribution, share rate, pressure and the fraction of volume at various times.  The velocity was employed at the inlet (0.2633, 0.1316, 0.0547 and 0.0283 m/s) for water and (0.1316 m/s) for oil, over and above the pressure set at outlet as a boundary condition. It was observed through the program

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Boosting the Network Performance using Two Security Measure Scenarios for Service Provider Network
...Show More Authors

Network security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Fri Jul 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimation of the Two Parameters for Generalized Rayleigh Distribution Function Using Simulation Technique
...Show More Authors

     In this paper, suggested formula as well a conventional method for estimating the twoparameters (shape and scale) of the Generalized Rayleigh Distribution was proposed. For different sample sizes (small, medium, and large) and assumed several contrasts for the two parameters a percentile estimator was been used. Mean Square Error was implemented as an indicator of performance and comparisons of the performance have been carried out through data analysis and computer simulation between the suggested formulas versus the studied formula according to the applied indicator. It was observed from the results that the suggested method which was performed for the first time (as far as we know), had highly advantage than t

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 16 2023
Journal Name
مجلة الاستاذ للعلوم الانسانية والاجتماعية- كلية التربية ابن رشد – جامعة بغداد،
Using the Theory of Conceptual Metaphor in Two Sonnets by Victorian Female Poets
...Show More Authors

This study has applied the theoretical framework of conceptual metaphor theory to the analysis of the source and target domains of metaphors that are used in two English nineteenth century sonnets, both written by contemporaneous female poets. The quantitative and qualitative results of the textual analysis have clearly revealed that Elizabeth Barrett Browning’s sonnet 23 centres around the conceptual mapping of the journey of love and life with that of possession. In contrast, Christina Rossetti’s sonnet Remember tackles the central conceptual mapping of death as a journey in relation to its further experiential connections. In addition, the application of conceptual metaphor theory in identifying the frequencies and densities of metap

... Show More
Publication Date
Fri Sep 30 2011
Journal Name
Iraqi Journal Of Science
Using the band ratio classification method to detect the regions that need to remove sedimentation in Tigris River
...Show More Authors

LandSat Satellite ETM+ image have been analyzed to detect the different depths of regions inside the Tigris river in order to detect the regions that need to remove sedimentation in Baghdad in Iraq Country. The scene consisted of six bands (without the thermal band), It was captured in March ٢٠٠١. The variance in depth is determined by applying the rationing technique on the bands ٣ and ٥. GIS ٩. ١ program is used to apply the rationing technique and determined the results.

View Publication