The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
Abstract
Language is one of God’s blessings to human beings through which he
distingushed them from other creatures, then how if this language was arabic.
God honored this language and in which he descended his Gracious Boole
that gave it glory and magnificance, and made it an immortal revelation to the
arab nation in their poetry, oration, history and human tendency to the life of
knowledge, mind leadershipe, innovation and progress.
This study aimed at evaluating the arabic language come program for
the new teachers. The sample was of (25) participants who were shown a
questionaire consisting of (60) items distributed on (9) fields. Then, the data
was processed statisically by using preauency rate, Kai s
This paper provides an attempt for modeling rate of penetration (ROP) for an Iraqi oil field with aid of mud logging data. Data of Umm Radhuma formation was selected for this modeling. These data include weight on bit, rotary speed, flow rate and mud density. A statistical approach was applied on these data for improving rate of penetration modeling. As result, an empirical linear ROP model has been developed with good fitness when compared with actual data. Also, a nonlinear regression analysis of different forms was attempted, and the results showed that the power model has good predicting capability with respect to other forms.
According to the current situation of peroxidase (POD), the relevant studies on this enzyme indicated its importance as a tool in clinical biochemistry and different industrial fields. Most of these studies used the fruits and vegetables as source of this enzyme. So that in order to couple the growing requirements for POD with the recent demands for reduc-ing disposal volume by recycling the plant waste, the aim of the present study was to extract POD through management of municipal bio-waste of Iraqi maize species. A simple, green and economical method was used to extract this enzyme. Our results revealed that maize cobs are rich sources of POD, where the activity of this enzyme was found to be 7035.54 U/g of cobs. In pilot experiments thi
... Show MoreHealth and safety problem can be described by statistics it can only be understood by knowing and feeling the pain, suffering, and depression. Health and safety has a legal responsibility to protect it for everyone who can affect in the workplace. This includes manufacturers, suppliers, designers and controllers of work places and employees. Work injury is one of the major problems in manufacturing and production systems industries; it is reduced production efficiency and affects the cost. To gain flexibility from a traditional manufacturing system and production efficiency, this paper is about the application of estimating technology to preview and synthesis of Lost Time of Work Injuries in industry systems aims to provide a safe workin
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreIn this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ
... Show More