Preferred Language
Articles
/
QxflN48BVTCNdQwCHWNS
Enhancing BER Performance Limit of BCH and RS Codes Using Multipath Diversity
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Role of E-Learning in enhancing Total Quality Management in Educational Institutions: an exploratory study of the opinions of a sample of the staff of the Directorate of Education in the province of Nineveh
...Show More Authors

Purpose: The research aims to determine the relationship between E-Learning and Total Quality Management (TQM) in Educational institutions in Nineveh Governorates.

Methodology / Design: The researchers distributed (30) questionnaires to employees (teachers and administrators) of Nineveh Governorate education who represent the community of the research sample, as they were analyzed using the SPSS V.20

The importance of research: The importance of the research in the fact that it focuses on one of the educational methods represented in integrating the traditional method and relying on modern technologies using computers and the Internet in the field of education to improve the reali

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 01 2021
Journal Name
Journal Of Engineering
Performance Evaluation of Pole Placement and Linear Quadratic Regulator Strategies Designed for Mass-Spring-Damper System Based on Simulated Annealing and Ant Colony Optimization
...Show More Authors

This paper investigates the performance evaluation of two state feedback controllers, Pole Placement (PP) and Linear Quadratic Regulator (LQR). The two controllers are designed for a Mass-Spring-Damper (MSD) system found in numerous applications to stabilize the MSD system performance and minimize the position tracking error of the system output. The state space model of the MSD system is first developed. Then, two meta-heuristic optimizations, Simulated Annealing (SA) optimization and Ant Colony (AC) optimization are utilized to optimize feedback gains matrix K of the PP and the weighting matrices Q and R of the LQR to make the MSD system reach stabilization and reduce the oscillation of the response. The Matlab softwar

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Object Detection and Distance Measurement Using AI
...Show More Authors

View Publication
Scopus (26)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon May 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Improvement Using The Combination of Wavelet and Multiwavelet Transform
...Show More Authors

      This paper introduces method of image enhancement using the combination of both wavelet and Multiwavelet transformation. New technique is proposed for image enhancement using one smoothing filter.

    A critically- Sampled Scheme of preprocessing method is used for computing the Multiwavelet.It is the 2nd norm approximation used to speed the procedures needed for such computation.

  An improvement was achieved with the proposed method in comparison with the conventional method. 

The performance of this technique has been done by computer using Visual Baisec.6 package.

View Publication Preview PDF
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Laser
Laser Microdrilling and Nanodrilling of 8009 Aluminium Alloy using Nanoparticles
...Show More Authors

 The microdrilling and nanodrilling holes are produced by a Q-switched Nd :YAG laser (1064 nm) interaction with 8009 Al alloy using nanoparticles. Two kinds of nanoparticles were used with this alloy. These nanoparticles are tungsten carbide (WC) and silica carbide (SiC). In this work, the microholes and nanoholes have been investigated with different laser pulse energies (600, 700 and 800)mJ, different repetition rates (5Hz and 10Hz) and different concentration of nanoparticles (90%, 50% and 5% ). The results indicate that  the microholes and nanoholes have been achieved when the laser pulse energy is 600 mJ, laser repetition rate is 5Hz, and the concentration of the  nanoparticles (for the two types of n

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Mar 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Simultaneous Determination of Sulfanilamide and Furosemide by Using Derivative Spectrophotometry
...Show More Authors

A simple, precise and accurate spectrophotometric method has been developed for simultaneous estimation of sulfanilamide and furosemide in their mixture by using first and second order derivative method in the ultraviolet region. The method depends on first and second derivative spectrophotometry, with zero-crossing and peak to base line and peak area measurements. The first derivative amplitudes at 214, 238 and 266 nm were selected for the assay of sulfanilamide and 240, 260, 284, 314 and 352 nm for furosemide. Peak area at 201222, 222-251 and 251-281 nm selected for estimation of sulfanilamide and at 229-249, 249270, 270-294, 294-333 and 333-382 nm for furosemide. The second derivative amplitudes at 220, 252 and 274 nm for sulfanilamid

... Show More
View Publication Preview PDF