Preferred Language
Articles
/
IBY1locBVTCNdQwCylfK
Research Address: New Multispectral Image Classification Methods Based on Scatterplot Technique
...Show More Authors

Publication Date
Wed May 01 2019
Journal Name
The Iraqi Journal For Information And Documentation Studies
The role and importance of scientific research in creating new knowledge and its impact on developing the cognitive capabilities of information and librarians and their Employees
...Show More Authors

The research aims at identifying the importance of scientific research for researchers and in creating new knowledge، development and utilization of mental and cognitive energies and developed them with the ability to research، extrapolation، meditation and then conclusion. The information was collected by interviewing the Secretary-General of the Central Library and by distributing questionnaire forms to the (33) teaching staff of the College of Higher Education. The responses of the society were analyzed the result and the recommendations were the most important 1. Information specialist and all employees of the administrators and technicians in the centers of information sources (libraries) and in the field are considered scientific r

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The adequacy of the methods used in the collection of tax debt in Iraq: Applied research in the General Authority for Taxation
...Show More Authors

If the sovereignty of the state is reflected in the taxation of its citizens, this sovereignty can not be completed and completed only if it works on its part to collect its debts, whether voluntary or compulsory, and the debt of the debt arises from the will of the individual and the will of the state alone, The existing management of seizure and collection is based on an unequal relationship between the State and the debtor from which the obligation arises. Naturally, this relationship has obligations and rights on both parties. The researcher used a set of studies and previous research, books and other sources related to the subject of research. This was done through the theoretical and practical aspects, which focused on direct and i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Land Classification Wadi Al-Salam Basin
...Show More Authors

Dry environment study forms an important part in the field of applies geomorphology for
the wide rang of its lands which form most of the world, homeland, and Iraqi lands specially,
and what these lands include of scientific cases which needs to be searched and investigated.
They include rocks, land shapes, water supplements, its ancient soil and its active diggings are
all signs of the environment changes and effects that these lands under take over time, with
continuous remains of its features of characteristics under geo morphological dry
circumstances which works to slow change average, when the geomorphologic fearers varies
in this environment and what it contain of important economical resource. As to participl

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Chem Tech Research
Synthesis of New Selective Electrodes for the Determination of Metronidazole Benzoate (MNZB) Based on a Molecularly Imprinted Polymer Combined With Poly Vinyl Chloride
...Show More Authors

Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Mon Mar 23 2020
Journal Name
Journal Of Engineering
Drag Reduction Using Passive Methods on KIA PRIDE Car Model
...Show More Authors

An experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the avera

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 08 2025
Journal Name
Journal Of Engineering
Drag Reduction Using Passive Methods on KIA PRIDE Car Model
...Show More Authors

An experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the average drag estimated on

... Show More
View Publication
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
Comparison between Different Data Image Compression Techniques Applied on SAR Images
...Show More Authors

In this paper, image compression technique is presented based on the Zonal transform method. The DCT, Walsh, and Hadamard transform techniques are also implements. These different transforms are applied on SAR images using Different block size. The effects of implementing these different transforms are investigated. The main shortcoming associated with this radar imagery system is the presence of the speckle noise, which affected the compression results.

View Publication Preview PDF