Preferred Language
Articles
/
ZxbcFooBVTCNdQwC7JBg
Reverberant signal separation using optimized complex sparse nonnegative tensor deconvolution on spectral covariance matrix
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Geological Journal
Multiple and Coherent Noise Removal from X-Profile 2D Seismic Data of Southern Iraq Using Common Depth Point Muting Procedures and Depending on Madagascar Open-Source Package
...Show More Authors

This article describes how to predict different types of multiple reflections in pre-track seismic data. The characteristics of multiple reflections can be expressed as a combination of the characteristics of primary reflections. Multiple velocities always come in lower magnitude than the primaries, this is the base for separating them during Normal Move Out correction. The muting procedure is applied in Time-Velocity analysis domain. Semblance plot is used to diagnose multiples availability and judgment for muting dimensions. This processing procedure is used to eliminate internal multiples from real 2D seismic data from southern Iraq in two stages. The first is conventional Normal Move Out correction and velocity auto picking and

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Study the effect of Grave's disease on the different tissues and organs of the body by using Wayne Thyrotoxicosis Diagnostic Index(WTDI) and Basel Metabolic Index(BMI)
...Show More Authors

The present work aimed to study the effect of Grave's disease on the different tissues and organs of the body by using Wayne Thyrotoxicosis Diagnostic Index (WTDI) and Basel Metabolic Index (BMI). To reach such aim, (35) patients were involved (25 females and 10 males). A control group of (15) healthy individuals (10 females and 5 males) was selected for comparison , as well as , the following: 1- Wayne Thyrotoxicosis Diagnostic Index (WTDI) applied on patient group and control group under the supervision of specialist medical team , this index include (19) sign and symptom , the appearance of one of them may be lead to the others. The sings and symptoms of the index appear only on the patients. There is no Significant di

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 20 2016
Journal Name
Al-academy
The Impact of using the strategy of shape (V) on the Achievement of the students of the Department of Artistic Education: كريم حواس علي، نجلاء خضير حسان
...Show More Authors

This research aim at finding out the impact of using the strategy of shape V on the achievement of the students of the Department of Artistic Education in the subject of "Principles of scientific Research ". This strategy is one of the cognitive strategies used in this topic . To verify the aim of the research ,the two researchers have put the following null hypothesis:-There are no significant differences on the level of 0,05 among the average degrees of the students of the experimental group in their answers on the topics of the pre and post cognitive achievement tests of the subject of "principles of scientific Research " . The two researchers have adopted the experimental approach which consists of one group . the population of the r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 07 2020
Journal Name
Environmental Science And Pollution Research
The biosorption of reactive red dye onto orange peel waste: a study on the isotherm and kinetic processes and sensitivity analysis using the artificial neural network approach
...Show More Authors

View Publication
Scopus (31)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Offline signatures matching using haar wavelet subbands
...Show More Authors

The complexity of multimedia contents is significantly increasing in the current world. This leads to an exigent demand for developing highly effective systems to satisfy human needs. Until today, handwritten signature considered an important means that is used in banks and businesses to evidence identity, so there are many works tried to develop a method for recognition purpose. This paper introduced an efficient technique for offline signature recognition depending on extracting the local feature by utilizing the haar wavelet subbands and energy. Three different sets of features are utilized by partitioning the signature image into non overlapping blocks where different block sizes are used. CEDAR signature database is used as a dataset f

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
The Writer Authentication by Using Syllables Frequency
...Show More Authors

An approach is depended in the recent years to distinguish any author or writer from other by analyzing his writings or essays. This is done by analyzing the syllables of writings of an author. The syllable is composed of two letters; therefore the words of the writing are fragmented to syllables and extract the most frequency syllables to become trait of that author. The research work depend on analyzed the frequency syllables in two cases, the first, when there is a space between the words, the second, when these spaces are ignored. The results is obtained from a program which scan the syllables in the text file, the performance is best in the first case since the sequence of the selected syllables is higher than the same syllables in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression using Hierarchal Linear Polynomial Coding
...Show More Authors

Publication Date
Wed Sep 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Using Ultraviolet Technique for Well Water Disinfection
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Advanced Research In Computer And Communication Engineering
Information hiding by using Developed M8PAM Technique
...Show More Authors