Preferred Language
Articles
/
_RcqMI8BVTCNdQwC7l7R
Quadtree Partitioning Scheme using Fixed Predictor Base
...Show More Authors

Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Enhancing Nitrate Ion Removal from Water using Fixed Bed Columns with Composite Chitosan-based Beads
...Show More Authors

    Water contamination is a pressing global concern, especially regarding the presence of nitrate ions. This research focuses on addressing this issue by developing an effective adsorbent for removing nitrate ions from aqueous solutions. two adsorbents Chitosan-Zeolite-Zirconium (Cs-Ze-Zr composite beads and Chitosan-Bentonite-Zirconium Cs-Bn-Zr composite beads were prepared. The study involved continuous experimentation using a fixed bed column with varying bed heights (1.5 and 3 cm) and inlet flow rates (1 and 3 ml/min). The results showed that the breakthrough time increased with higher bed heights for both Cs-Ze-Zr and Cs-Bn-Zr composite beads. Conversely, an increase in flow rate led to a decrease in breakthrough time. Notab

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
A Direct Solution Scheme for Wide-Angle Electromagnetic Scattering Problems Using Compressive Sensing-Based Method of Moments
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Robust Watermarking Scheme for GIS Vector Maps
...Show More Authors

  With the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming  the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data.

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Existence And Controllability Results For Fractional Control Systems In Reflexive Banach Spaces Using Fixed Point Theorem
...Show More Authors

       In this paper, a fixed point theorem of nonexpansive mapping is established to study the existence and sufficient conditions for the controllability of nonlinear fractional control systems in reflexive Banach spaces. The result so obtained have been modified and developed in arbitrary space having Opial’s condition by using fixed point theorem deals with nonexpansive mapping defined on a set has normal structure. An application is provided to show the effectiveness of the obtained result.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2015
Journal Name
J Fac Med Baghdad
AH jump as predictor for successful Ablation of atrioventricular nodal reentrant tachycardia (AVNRT)
...Show More Authors

Background: Atrioventricular nodal reentrant tachycardia (AVNRT) is the commonest regular supraventricular tachyarrhythmia. Ablation in the area of slow pathway (SP) has been successfully implemented in every day clinical electrophysiological practice for more than 20 years. Although the procedure is generally regarded as effective and safe, data on long-term effects and predictors of success or failure are incomplete.

Publication Date
Fri Dec 14 2018
Journal Name
International Journal Of Women's Health And Reproduction Sciences
Role of Maternal Serum Glycodelin as Predictor of Ectopic Pregnancy in First Trimester
...Show More Authors

Objectives: Assessment of glycodelin (GD) as a marker for unruptured ectopic pregnancy (EP) in the first trimester of pregnancy. Materials and Methods: This case-control study was conducted during June 2016 to May 2017 in the Obstetrics and Gynecological Department of Baghdad University at Baghdad teaching hospital/medical city complex. In this study, 100 pregnant women in their first trimester of pregnancy were included after clinical and ultrasonic findings. Results: Based on the results, GD levels in EP were significantly lower than those with normal intrauterine pregnancy (1.58 ± 1.18 vs. 30.1 ± 11.9). In addition, using receiver operator curve analysis, the cut-off GD level of 9.5 and less had acceptable validity results (100

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Bulletin Of Electrical Engineering And Informatics
Lightweight hamming product code based multiple bit error correction coding scheme using shared resources for on chip interconnects
...Show More Authors

In this paper, we present multiple bit error correction coding scheme based on extended Hamming product code combined with type II HARQ using shared resources for on chip interconnect. The shared resources reduce the hardware complexity of the encoder and decoder compared to the existing three stages iterative decoding method for on chip interconnects. The proposed method of decoding achieves 20% and 28% reduction in area and power consumption respectively, with only small increase in decoder delay compared to the existing three stage iterative decoding scheme for multiple bit error correction. The proposed code also achieves excellent improvement in residual flit error rate and up to 58% of total power consumption compared to the other err

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sat Nov 05 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Image Compression Based on Cubic Bezier Interpolation, Wavelet Transform, Polynomial Approximation, Quadtree Coding and High Order Shift Encoding
...Show More Authors

In this study, an efficient compression system is introduced, it is based on using wavelet transform and two types of 3Dimension (3D) surface representations (i.e., Cubic Bezier Interpolation (CBI)) and 1 st order polynomial approximation. Each one is applied on different scales of the image; CBI is applied on the wide area of the image in order to prune the image components that show large scale variation, while the 1 st order polynomial is applied on the small area of residue component (i.e., after subtracting the cubic Bezier from the image) in order to prune the local smoothing components and getting better compression gain. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, t

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Engineering
Kinetics of Fixed Bed Sorption Processes
...Show More Authors

Adsorption and ion exchange are examples of fixed-bed sorption processes that show transient behavior. This means that differential equations are needed to design them. As a result, numerical methods are commonly utilized to solve these equations. The solution frequently used in analytical methods is called the Thomas solution. Thomas gave a complete solution that adds a nonlinear equilibrium relationship that depends on second-order reaction kinetics. A computational approach was devised to solve the Thomas model. The Thomas model's validity was established by conducting three distinct sets of experiments. The first entails the adsorption of acetic acid from the air through the utilization of activated carbon. Following

... Show More
View Publication Preview PDF
Crossref