Preferred Language
Articles
/
_xaw04cBVTCNdQwC_2jD
Calculation of Salinity and Soil Moisture indices in south of Iraq - Using Satellite Image Data
...Show More Authors

A band rationing method is applied to calculate the salinity index (SI) and Normalized Multi-Band Drought Index (NMDI) as pre-processing to take Agriculture decision in these areas is presented. To separate the land from other features that exist in the scene, the classical classification method (Maximum likelihood classification) is used by classified the study area to multi classes (Healthy vegetation (HV), Grasslands (GL), Water (W), Urban (U), Bare Soil (BS)). A Landsat 8 satellite image of an area in the south of Iraq are used, where the land cover is classified according to indicator ranges for each (SI) and (NMDI).

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering Science And Technology
Using sustainable material in improvement the geotechnical properties of soft clayey soil
...Show More Authors

Preview PDF
Scopus (41)
Scopus
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Naturally occurring radioactive materials and related hazard indices in Ahdeb oil field
...Show More Authors

In this work, measurements of activity concentration of naturally occurring radioactive materials (NORM) isotopes and their related hazard indices for several materials such as crude oil, sludge and water in Ahdeb oil fields in Waste governorate using high pure germanium coaxial detection technique. The average values for crude oil samples were174.72Bq/l, 43.46Bq/l, 355.07Bq/l, 264.21Bq/l, 122.52nGy/h, 0.7138, 1.1861, 0.601 mSv/y, 0.1503mSv/y and 1.8361 for Ra-226, Ac-228, K-40, Ra eq, D, H-external and H-internal respectively. According to the results; the ratio between 238U to 232Th was 4, which represents the natural ratio in the crust earth; therefore, one can be strongly suggested that the geo-stricture of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 30 2010
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
CORROSION of BOILER TUBES in SOUTH BAGHDAD ELECTRIC STATION
...Show More Authors

The corrosion of low carbon steel boiler tubes in demi water had been investigated. The purpose of this investigation was to determine the change produced in corrosion behavior of the carbon steel as a result of the specific presence of chloride and copper ions in the water under different temperatures. For low carbon steel experiments, the temperature was taken in three levels (125, 175, and 215°C) under about 27 bar pressure and 1500 rpm in autoclave. Using weight loss technique, the corrosion rate ranges from (85 to 789 gmd) for low carbon steel boiler tubes.

View Publication Preview PDF
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Diagnostic Approach of Atypical Cells in Effusion Cytology Using Computerized Image Analysis
...Show More Authors

Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Al–bahith Al–a'alami
Arabic language and tongue violence in Arab satellite channels
...Show More Authors

This study aimed at identifying the effect of violence on speech disorders concerning Arab Broadcasting . Language is a pot of thought and a mirror of human civilization and communication tool, but the Arabic language is suffering a lot of extraneous terms them, particularly through the media. This study attempts to answer the following question: Is the phenomenon of linguistic duality in the Media reflected negatively on the rules of the classical language? The study deals with the explanation and interpretation of the phenomenon that has become slang exist in our Media More. And the study suggests re- consideration of the value in the Media ,hence the problem will be resolved.   

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 23 2016
Journal Name
Computer Science & Information Technology ( Cs & It )
Modelling Dynamic Patterns Using Mobile Data
...Show More Authors

View Publication
Crossref
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lossless Data Hiding Using L·SB Method
...Show More Authors

A loS.sless (reversible) data hiding (embedding) method  inside  an image  (translating medium)  - presented   in  the  present  work  using  L_SB (least  significant  bit). technique  which  enables  us to translate   data  using an  image  (host  image),  using  a  secret  key, to  be  undetectable  without losing  any  data  or  without   changing   the  size  and  the  external   scene (visible  properties) of the image, the hid-ing data is then can  be extracted (without  losing)   by reversing &n

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref