Preferred Language
Articles
/
alkej-418
Reverse Engineering Representation Using an Image Processing Modification
...Show More Authors

In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred between the proposed and original part so as to demonstrate the verification of the proposed method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Modify Symmetric Block Cipher Algorithm Using Generated Digital 3D Fractal Image
...Show More Authors

The principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 17 2019
Journal Name
Iraqi Journal Of Science
On Commutativity of Prime and Semiprime - Rings with Reverse Derivations
...Show More Authors

Let M be a weak Nobusawa -ring and γ be a non-zero element of Γ. In this paper, we introduce concept of k-reverse derivation, Jordan k-reverse derivation, generalized k-reverse derivation, and Jordan generalized k-reverse derivation of Γ-ring, and γ-homomorphism, anti-γ-homomorphism of M. Also, we give some commutattivity conditions on γ-prime Γ-ring and γ-semiprime Γ-ring .

View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Assessment of endothelial dysfunction by flow mediated dilatation in patients with Coronary Artery Disease
...Show More Authors

Background: Endothelial dysfunction is thought to be a key event in the development of atherosclerosis. It is a systemic process that simultaneously affects different vascular territories including coronary arteries. It is recommended that noninvasive approaches assessing endothelial function in peripheral vessels like flow mediated dilatation are indirectly representative of coronary vascular function.
Objectives: This study is aimed to assess endothelial dysfunction by using flow mediated dilatation in patients with coronary artery disease
Patients and methods: 82 patients of either sex with an age range of 40-65years are involved in this study. Each patient was subjected to two tests; first test was the flow mediated dilatation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Early Diagnose Alzheimer's Disease by Convolution Neural Network-based Histogram Features Extracting and Canny Edge
...Show More Authors

Alzheimer's disease (AD) increasingly affects the elderly and is a major killer of those 65 and over. Different deep-learning methods are used for automatic diagnosis, yet they have some limitations. Deep Learning is one of the modern methods that were used to detect and classify a medical image because of the ability of deep Learning to extract the features of images automatically. However, there are still limitations to using deep learning to accurately classify medical images because extracting the fine edges of medical images is sometimes considered difficult, and some distortion in the images. Therefore, this research aims to develop A Computer-Aided Brain Diagnosis (CABD) system that can tell if a brain scan exhibits indications of

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Using Computer Processing Interpretation (CPI) Technique to Evaluate Mishrif Formation in Garraf Oil Field, Southern Iraq
...Show More Authors

The aim of this study is to determine and evaluate the units and subunits of Mishrif Formation in Garraf oil field 85 km north of Nasiriyah city depending mainly on the geophysical well logging data and other amiable geological information. The sets of the geophysical well logs data acquired from GA-4, GA- AIP, GA- B8P, GA-3 and GA-5 wells of Garraf oil field are used to determine the petrophysical and lithological properties for each zone in Mishrif Formation to locate, define and evaluate hydrocarbon production from each zone in the reservoir which is also known as formation evaluation. The digitization was done by using Didger software and the interpretations were made using Interactive Petrophysics Program v 3.5 and Petrel software.

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 15 2021
Journal Name
Al-academy
Simulation of myths in industrial product design "the seven eyes amulet as a model"
...Show More Authors

The research is to identify the legend of the seven eyes amulet of Babylonian origin and the representations it carried of the link between the Babylonian past and the Islamic present presented in the design works of the promoted products, preserving its impact in the souls as a way to avoid the act of envy, and from this was the research problem that I want to get answers to, which That is (How was the legend of the seven-eyes amulet represented in the design of industrial products?), making its goal to identify how that legend was represented within the design work of marketed industrial products, and in order to reach the answer, the research presented many concepts starting with the legend in its various forms in industrial products.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
EfficientEfficientEfficientEfficientEfficientEfficientEfficientEfficientEfficient text in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image hidingtext in image
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the cov

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Delivery Route Management based on Dijkstra Algorithm
...Show More Authors

For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Apr 18 2023
Journal Name
Al–bahith Al–a'alami
Counter Psychological Warfare in the partisan press during the operations of Mosul liberation: An analytical study in the “Tareek Al Shaab” Newspaper
...Show More Authors

The research aims to monitor the methods of Counter psychological warfare in the Iraqi press during the operations to liberate Mosul from the control of the terrorist organization ISIS.The research used the survey method, and “Tareek Al Shaab” Newspaper as a research sample, chosen according to the systematic random sample.
The research reached the following results:
1- The Communicator’s relied on the contents of the counter-psychological warfare and its methods in the battle of “Qadimun Ya Naynawa” used in the newspaper. The methods used were labels assigning such as : inevitable victory, prodding and morale, consensus, breaking of opposition morale, stereotyping, demonization of the opponent

... Show More
View Publication Preview PDF
Crossref