Preferred Language
Articles
/
QBfkN48BVTCNdQwCWWPS
Performance of BCH and RS Codes in MIMO System Using MPFEC Diversity Technique
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Jan 28 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Forecasting the performance and profitability of companies using the equation of Tobin’sq
...Show More Authors

The main objective and primary concern to every investor not only to achieve a greater return on his or her investments, but also to create the largest possible value of these investments the, researchers and those interested in the field of investment and financial analysis  try to develop standards  for performance      valuation      is guided through the                                     &nbsp

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 05 2018
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and characterization of timed drug delivery system of sumatriptan using natural polymers
...Show More Authors

Pulsatile drug delivery systems are time-controlled dosage forms which are designed to release the active pharmaceutical ingredient after a predetermined lag time to synchronize the disease circadian rhythm. A migraine shows circadian rhythm with a marked increase in attacks between 6 a.m. and 8 a.m.

Sumatriptan is a selective agonist at serotonin (5-Hydroxy tryptamine1  (5-HT1))receptors, is an effective treatment for acute migraine attacks.

The aim of this work is to prepare time-controlled press-coated tablet with a lag time of 5.45 hrs.

Six formulas of fast dissolving core tablets and three formulas of press-coated tablets were prepared by using direct compression method using different variables to prepa

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Al–bahith Al–a'alami
Social Media Networks and Freedom of Expression of Individual Rights and Social Diversity: Facebook is a Sample
...Show More Authors

We are, today, facing a torrent of information, ideas, images and videos due to advances of communication technology and electronic publishing. In addition to the proliferation of social networking sites that allow individuals to use them and participate in their channels without any restrictions limiting their freedom in publishing. Due to these sites many terms have emerged like alternative media which use internet and its various techniques to serve its objectives notably the freedom of expression without restrictions. This research studies the phenomenon of interactive media i.e. alternative media through Facebook along with the freedom that makes it spreading in the society and the relation of individual freedom with social diversit

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
The functional diversity of the directorial vision in the political theater cinema as a model
...Show More Authors

It is very necessary for the political theater to be within the space of every theatrical performance, so that the theater carries the diverse and enlightened values and cultures of this world. political theatre. In the first chapter, the researcher dealt with (the methodological framework), which includes the research problem identified by the researcher with the following question (the functional diversity of the directorial vision in the political theater)
Importance, purpose, limits and seal by defining terminology.
In the second chapter, the researcher dealt with the theoretical framework on two topics, the first (transformations of directorial vision in theatrical performance) and the second topic (aesthetic experiences i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science & Technology
Robust Watermarking for Video Using Modulation Technique on RGB Domain
...Show More Authors

In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Different methods for characterizing surface roughness using laser speckle technique
...Show More Authors

In this work, results from an optical technique (laser speckle technique) for measuring surface roughness was done by using statistical properties of speckle pattern from the point of view of computer image texture analysis. Four calibration relationships were used to cover wide range of measurement with the same laser speckle technique. The first one is based on intensity contrast of the speckle, the second is based on analysis of speckle binary image,  the third is on size of speckle pattern spot, and the latest one is based on characterization of the energy feature of the gray level co-occurrence matrices for the speckle pattern. By these calibration relationships surface roughness of an object surface can be evaluated within the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (18)
Crossref (5)
Scopus Crossref
Publication Date
Wed Oct 12 2011
Journal Name
Journal Of Liquid Chromatography &amp; Related Technologies
RAPID DETERMINATION OF SPHINGANINE AND SPHINGOSINE IN URINE BY HIGH PERFORMANCE LIQUID CHROMATOGRAPHY USING MONOLITHIC COLUMN
...Show More Authors

A rapid high performance liquid chromatography method for the determination of sphinganine (Sa) and sphingosine (So) in urine samples by employing a silica-based monolithic column is described. The samples were first extracted using ethyl acetate and derivatized using ortho-phthaldialdehyde in the presence of 2-mercaptoethanol. C20 sphinganine was used as internal standard. Under the optimized conditions, separation was achieved using a mixture of methanol:water (93:7, v/v), column temperature at 30°C, flow rate of 1 mL min−1, and an injection volume of 10 μL. Good linearity was obtained for Sa and So over the concentration range 20–500 ng mL−1(correlation coefficients ≥0.9978). The detection limits were 0.45 ng mL−1 for Sa and

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref