Preferred Language
Articles
/
ZxcZqJEBVTCNdQwC0ZeT
Studying the Optical Properties of CdSe Quantum Dots Prepared by Colloidal Method with Different pH Values
...Show More Authors

Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Classification of Arabic Alphabets Using a Combination of a Convolutional Neural Network and the Morphological Gradient Method
...Show More Authors

The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 31 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Comparative study of retention of fiber-reinforced post at middle and cervical one thirds of root canal cemented by polycarboxylate and zinc phosphate cements measured at different storage times
...Show More Authors

Background: The purpose of this study was to compare regional bond strength at middle and cervical thirds of the root canal among glass fiber-reinforced composite (FRC) endodontic posts cemented with different cements, using the push-out test to compare the performance (retention) of two types of luting cements; polycarboxylate cement and Zinc phosphate cement used to cement translucent fiber post and to compare the result of the push-out test at different storage times;1 week ,1month and 2 months. Materials and methods: Ninety caries-free, recently extracted single-rooted human teeth with straight root canals was used in this study, The root canals were endodontically instrumented at a working length of 0.5 mm from the apex by m

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
International Journal Of Drug Delivery Technology
Simple and Rapid Method For Estimate of Propranolol With Bi (III) Via Long-Distance Chasing Photometer (NAG-ADF-300-2) Utilization Continuous Flow Injection Analysis
...Show More Authors

A simple, sensitive and rapid method was used for the estimate of: Propranolol with Bi (III) to prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on a reaction between propranolol and Bi (III) in an aqueous medium to obtain a yellow precipitate. Optimum parameters were studied to increase the sensitivity for the developed method. A linear range for calibration graph was 0.1-25 mmol/L for cell A and 1-40 mmol/L for cell B, and LOD 51.8698 ng/200 µL and 363.0886 ng /200 µL , respectively to cell A and cell B with correlation coefficient (r) 0.9975 for cell A, 0.9966 for cell B, RSD% was lower than 1%, (n = 8) for the

... Show More
Publication Date
Sat Apr 08 2023
Journal Name
Iraqi Journal Of Oil And Gas Research (ijogr)
How to Estimate the Major Petrophysical Properties: A Review
...Show More Authors

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Basic Education
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg

... Show More
View Publication
Publication Date
Sat Dec 03 2022
Journal Name
Tikrit Journal Of Pure Science
A Pixel Based Method for Image Compression
...Show More Authors

The basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Wed May 01 2019
Journal Name
Journal Of Engineering
Reduced Complexity SLM Method for PAPR Reduction
...Show More Authors

In this paper, the computational complexity will be reduced using a revised version of the selected mapping (SLM) algorithm. Where a partial SLM is achieved to reduce the mathematical operations around 50%. Although the peak to average power ratio (PAPR) reduction gain has been slightly degraded, the dramatic reduction in the computational complexity is an outshining achievement. Matlab simulation is used to evaluate the results, where the PAPR result shows the capability of the proposed method.  

 

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
FINITE ELEMENT METHOD FOR INCOMPRESSIBLE VISCOELASTIC MATERIALS
...Show More Authors

A numerical method (F.E.)was derived for incompressible viscoelastic materials, the aging and
environmental phenomena especially the temperature effect was considered in this method. A
treatment of incompressibility was made for all permissible values of poisons ratio. A
mechanical model represents the incompressible viscoelastic materials and so the properties can
be derived using the Laplace transformations technique .A comparison was made with the other
methods interested with viscoelastic materials by applying the method on a cylinder of viscoelastic material surrounding by a steel casing and subjected to a constant internal pressure, as well as a comparison with another viscoelastic method and for Asphalt Concrete pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
New Iterative Method for Solving Nonlinear Equations
...Show More Authors

The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.

View Publication Preview PDF
Crossref