Preferred Language
Articles
/
QBeIh5ABVTCNdQwCVozV
Thermal performance improvement based on the hybrid design of a heat sink
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Transformations of the Actor's Performance of many Characters in the Iraqi Theatre "Facebook a model": اقبال عبد الجبار عيفان
...Show More Authors

Transformations of the actor when acting many characters are the product of joint work between the actor and the director through the instructions and the exercises that facilitate the reach for the desired goal.

The method or way has often been used which is Stanislavsky premises in his work with the actor in the role. The first section consists of two parts under the heading of the actor's work with himself. The two parts are preparing the actor in creative suffering (internal), and in coexistence and embodiment (outside). The second section is the book of the actor's work with the role. The current research aims at identifying the mechanism of the acting performance transformations among many characters of the same actor.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
The Effect of Addition of Combination of Plasma Treated Polyester and Polyamide Fibers on Surface Roughness and Some Mechanical Properties of Heat Cured Acrylic Resin
...Show More Authors

Background: Poly (methyl methacrylate) has several disadvantages (poor mechanical properties) like impact and transverse strength. In order to overcome these disadvantages, several methods were used to strengthen the acrylic resin by using different fibers or fillers. This study was conducted to evaluate the effect of Plasma treatment of the fiber on mechanical properties Poly (methyl methacrylate) denture base material. Materials and methods: Specimens were prepared from poly methyl metha acrylic (PMMA) divided according to present of fiber into 4 groups (first group without fiber as control group, second group with Plasma treated polyester fibers, third group with Plasma treated polyamide fibers and fourth group Plasma treated combination

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Baghdad College Of Dentistry
The Effect of Addition of Combination of Plasma Treated Polyester and Polyamide Fibers on Surface Roughness and Some Mechanical Properties of Heat Cured Acrylic Resin
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
2019 2nd International Conference On Engineering Technology And Its Applications (iiceta)
Human Gait Identification System Based on Average Silhouette
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Optimum Median Filter Based on Crow Optimization Algorithm
...Show More Authors

          A novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Sat Jun 26 2021
Journal Name
2021 Ieee International Conference On Automatic Control & Intelligent Systems (i2cacis)
Vulnerability Assessment on Ethereum Based Smart Contract Applications
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Mon May 15 2017
Journal Name
International Journal Of Image And Data Fusion
Image edge detection operators based on orthogonal polynomials
...Show More Authors

View Publication
Scopus (32)
Crossref (10)
Scopus Crossref