Preferred Language
Articles
/
XhbMZIkBVTCNdQwCDon1
EFFICIENTMETHODSOFIRISRECOGNITION
...Show More Authors

Identification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognition step to identify strengths and weakness for each one that could be helpful for future research in this area.

Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Two of (Turnbull) and (Generalization Turnbulls)non-parametric methods in estimating conditional survival function (applied study on breast cancer patients)
...Show More Authors

   This research includes the application of non-parametric methods in estimating the conditional survival function represented in a method (Turnbull) and (Generalization Turnbull's) using data for Interval censored of breast cancer and two types of treatment, Chemotherapy and radiation therapy and age is continuous variable, The algorithm of estimators was applied through using (MATLAB) and then the use average Mean Square Error (MSE) as amusement  to the estimates and the results showed (generalization of Turnbull's) In estimating the conditional survival function and for both treatments ,The estimated survival of the patients does not show very large differences

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The adequacy of the methods used in the collection of tax debt in Iraq: Applied research in the General Authority for Taxation
...Show More Authors

If the sovereignty of the state is reflected in the taxation of its citizens, this sovereignty can not be completed and completed only if it works on its part to collect its debts, whether voluntary or compulsory, and the debt of the debt arises from the will of the individual and the will of the state alone, The existing management of seizure and collection is based on an unequal relationship between the State and the debtor from which the obligation arises. Naturally, this relationship has obligations and rights on both parties. The researcher used a set of studies and previous research, books and other sources related to the subject of research. This was done through the theoretical and practical aspects, which focused on direct and i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
Tourist Resting Units and their Design Methods in the Iraqi Marshlands: هدى محمود عمر -لقاء غازي حمد منصور
...Show More Authors

    The study dealt with the design of tourist resting units in the Iraqi Marshes in contemporary design methods while preserving the heritage. The first chapter contained the research problem which is the important event of the inclusion of the Marshes in the World Heritage List. This research is important because it aims to develop the tourist reality of the Marshlands. The second chapter dealt with three sections the first of which is tourism in the marsh environment, the second one dealt with the structure of tourist space and the third dealt with the design methods of the tourist resting units in the Iraqi marshes.

The most important results of the research are the following: the sample models have taken desig

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 10 2017
Journal Name
Journal Of The College Of Languages (jcl)
Moderne Lehrmethodenzum Hörverstehen im Deutschunterricht Schlüsselwort: Lehrmethode-Hörverstehen-Deutschunterricht Modern methods for teaching listening comprehension in German language
...Show More Authors

Diese Forschungsarbeit versteht sich als ein Versuch zur Bestimmung einer der neuen Unterrichtsmethoden, die den Lernenden im Fach Deutsch besonders interessant vorkommen.Der Unterricht soll in einer Atmosphäre, die frei von Zeitdruck, Angst und Zensurdruck ablaufen lassen, damit werden die Studenten ermutigt, die Nutzung von Spiel zu ihrer eigenen Sache machen, um die Spielziele Spaß, Empathie, Zusammenarbeit und Kommunikation zu realisieren. Das Hauptlernziel des Fremdsprachenunterrichts ist es, Lernenden zu ermöglichen, in der Zielsprache zu kommunizieren.

Wir konzentrieren uns in diesem Beitrag auf eine wichtige sprachliche Fertigkeit, die den rezeptiven Fertigkeiten gehört, die ist das Hörverstehen.

Das Hörvers

... Show More
View Publication Preview PDF
Publication Date
Tue May 01 2012
Journal Name
Engineering Analysis With Boundary Elements
Radial integration boundary integral and integro-differential equation methods for two-dimensional heat conduction problems with variable coefficients
...Show More Authors

View Publication
Crossref (33)
Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Neuroquantology
HOMO-LUMO Energies and Geometrical Structures Effecton Corrosion Inhibition for Organic Compounds Predict by DFT and PM3 Methods
...Show More Authors

A theoretical study on corrosion inhibitors was done by quantum calculations includes semi-empirical PM3 and Density Functional Theory (DFT) methods based on B3LYP/6311++G (2d,2P). Benzimidazole derivative (oxo(4- ((phenylcarbamothioyl) carbamoyl)phenyl) ammonio) oxonium (4NBP) and thiourea derivative 2-((4- bromobenzyl)thio) -1H-benzo[d] imidazole (2SB) were used as corrosion inhibitors and an essential quantum chemical parameters correlated with inhibition efficiency, EHOMO (highest occupied molecular orbital energy) and ELUMO (lowest molecular orbital energy). Other parameters are also studied like energy gap [ΔE (HOMO-LUMO)], electron affinity (EA), hardness (Δ), dipole moment (μ), softness (S), ionization potential (IE), absolut

... Show More
View Publication Preview PDF
Scopus (62)
Crossref (52)
Scopus Crossref
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
The Calculation and Analysis of the Total Electron Content Over Different Latitudes and Seasons Using the Numerical Trapezoidal and Simpson Methods
...Show More Authors

It has been shown in ionospheric research that calculation of the total electron content (TEC) is an important factor in global navigation system. In this study, TEC calculation was performed over Baghdad city, Iraq, using a combination of two numerical methods called composite Simpson and composite Trapezoidal methods. TEC was calculated using the line integral of the electron density derived from the International reference ionosphere IRI2012 and NeQuick2 models from 70 to 2000 km above the earth surface. The hour of the day and the day number of the year, R12, were chosen as inputs for the calculation techniques to take into account latitudinal, diurnal and seasonal variation of TEC. The results of latitudinal variation of TE

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Mar 29 2021
Journal Name
Journal Of Engineering
Extracting Four Solar Model Electrical Parameters of Mono-Crystalline Silicon (mc-Si) and Thin Film (CIGS) Solar Modules using Different Methods
...Show More Authors

Experimental measurements were done for characterizing current-voltage and power-voltage of two types of photovoltaic (PV) solar modules; monocrystalline silicon (mc-Si) and copper indium gallium di-selenide (CIGS). The conversion efficiency depends on many factors, such as irradiation and temperature. The assembling measures as a rule cause contrast in electrical boundaries, even in cells of a similar kind. Additionally, if the misfortunes because of cell associations in a module are considered, it is hard to track down two indistinguishable photovoltaic modules. This way, just the I-V, and P-V bends' trial estimation permit knowing the electrical boundaries of a photovoltaic gadget with accuracy. This measure

... Show More
View Publication Preview PDF
Crossref (4)
Crossref