Preferred Language
Articles
/
TxblsocBVTCNdQwCzVsv
Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
A New Approach for Designing Multi Information Management System Using XML Technology
...Show More Authors

 

XML is being incorporated into the foundation of E-business data applications. This paper addresses the problem of the freeform information that stored in any organization and how XML with using this new approach will make the operation of the search very efficient and time consuming. This paper introduces new solution and methodology that has been developed to capture and manage such unstructured freeform information (multi information) depending on the use of XML schema technologies, neural network idea and object oriented relational database, in order to provide a practical solution for efficiently management multi freeform information system.

    

View Publication Preview PDF
Publication Date
Thu Dec 01 2016
Journal Name
2016 Ieee Symposium Series On Computational Intelligence (ssci)
A fusion of time-domain descriptors for improved myoelectric hand control
...Show More Authors

View Publication
Scopus (34)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Sun Apr 08 2018
Journal Name
Al-khwarizmi Engineering Journal
Energy Consumption Analyzing in Single hop Transmission and Multi-hop Transmission for using Wireless Sensor Networks
...Show More Authors

Wireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). Th

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Journal Of Babylon University
Synthesis and Identification of Pyromellitamic diacids and Pyromellitdiimides derivatives.
...Show More Authors

New derivatives of pyromellitamic diacids and pyromellitdiimides have been prepared by the reaction of one mole of pyromellitic dianhydride with two moles of aromatic amines, these derivatives were characterized by elemental analysis, FT-IR and melting point.

Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Iraqi Journal Of Physics
Coupled channels calculations of fusion reactions for 46Ti+64Ni, 40Ca+194Pt and 40Ar+148Sm systems
...Show More Authors

In this work, the fusion cross section ,  fusion barrier distribution  and the probability of fusion  have been investigated by coupled channel method  for the systems 46Ti+64Ni, 40Ca+194Pt and 40Ar+148Sm with semi-classical and quantum mechanical approach using SCF and CCFULL Fortran codes respectively. The results for these calculations are compared with available experimental data. The results show that the quantum calculations agree better with experimental data, especially bellow the Coulomb barrier, for the studied systems while above this barrier, the two codes reproduce the data.

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Synthesis, Identification, Theoretical Study, and Effect of the New Heterocyclic System from Ciprofloxacin Derivatives on the Activity of Some Liver Enzymes
...Show More Authors

The target of this study was to synthesize several new Ciprofloxacin drug analogs by providing a nucleophilic substitution procedure that provides new functionality at the carboxylic group location. The analogs were synthesized, designed, and characterized by 1HNMR, and FTIR. The synthetic path began from the reaction of ciprofloxacin drug with morpholine to give compound[B], ciprofloxacin derivative was linked with a variety of primary and secondary amines to give compounds[B1-B9]. The above-mentioned prepared compounds [B3 and B5] were applied to liver enzymes, and the increase in the activity of these enzymes was observed. In addition, a theoretical study was conducted to study the energies and properties of the prepared co

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors

Concealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary,  hide two bits from the message in  two bits of the least significant b

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors

Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
Evidence for monotheism in Islam and the Qur’an and the meaning of the names and attributes and their unification
...Show More Authors

This topic is considered to be of a high degree of importance to every Muslim, and its importance is due to the fact that monotheism is:

Prove that God Almighty is the God who created everything and everything opposite to monotheism is polytheism, and it is taking other than God Almighty as a deity.

Therefore, we have to know the concept of God. If he is known, then he knows the concept of monotheism and the concept of polytheism

View Publication Preview PDF