Preferred Language
Articles
/
bsj-1073
Motion Recording for Surveillance Camera
...Show More Authors

In this paper we present an operational computer vision system for real-time motion detection and recording that can be used in surveillance system. The system captures a video of a scene and identifies the frames that contains motion and record them in such a way that only the frames that is important to us is recorded and a report is made in the form of a movie is made and can be displayed. All parts that are captured by the camera are recorded to compare both movies. This serves as both a proof-of- concept and a verification of other existing algorithms for motion detection. Motion frames are detected using frame differencing. The results of the experiments with the system indicate the ability to minimize some of the problems false detection and missed detections (like in a sudden change of light in the scene). The software part is written in Matlab language as an M-file and using the Simulink library, the hardware part we used a Pentium 4 computer with a web camera or a laptop integrated camera.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Electrocoagulation of phenol for wastewater treatment
...Show More Authors

Electrocoagulation is an electrochemical process of treating polluted water where sacrificial anode corrodes to produce active coagulant (usually aluminum or iron cations) into solution. Accompanying electrolytic reactions evolve gas (usually as hydrogen bubbles). The present study investigates the removal of phenol from water by this method. A glass tank with 1 liter volume and two electrodes were used to perform the experiments. The electrode connected to a D.C. power supply. The effect of various factors on the removal of phenol (initial phenol concentration, electrode size, electrodes gab, current density, pH and treatment time) were studied. The results indicated that the removal efficiency decreased as initial phenol concentration

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
Wavelet compression for remotely sensed images
...Show More Authors

Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.

View Publication Preview PDF
Publication Date
Thu Jul 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Score for the Group SL(2,38)
...Show More Authors

        The set of all (n×n) non-singular matrices over the field F. And this set forms a group under the operation of matrix multiplication. This group is called the general linear group of dimension  over the field F, denoted by . The determinant of these matrices is a homomorphism from  into F* and the kernel of this homomorphism was the special linear group and denoted by  Thus  is the subgroup of  which contains all matrices of determinant one.

The rationally valued characters of the rational representations are written as a linear combination of the induced characters for the groups discussed in this paper. We find the Artin indicator for this group after studying the rationally valued characters of the rational

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Outcome for the group SL(2,57)
...Show More Authors

The set of all (n×n) non-singular matrices over the field F this set forms a group under the operation of matrix multiplication. This group is called the general linear group of dimension  over the field F, denoted by . The determinant of these matrices is a homomorphism from  into F* and the kernel of this homomorphism was the special linear group and denoted by  Thus  is the subgroup of  which contains all matrices of determinant one.

The rational valued characters of the rational representations written as a linear combination of the induced characters for the groups  discuss in this paper and find the Artin indicator for this group after study the rational valued characters of the rational representations and the induce

... Show More
View Publication
Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Adaptive Coded Modulation for OFDM System
...Show More Authors

This paper studies the adaptive coded modulation for coded OFDM system using punctured convolutional code, channel estimation, equalization and SNR estimation. The channel estimation based on block type pilot arrangement is performed by sending pilots at every sub carrier and using this estimation for a specific number of following symbols. Signal to noise ratio is estimated at receiver and then transmitted to the transmitter through feedback channel ,the transmitter according to the estimated SNR select appropriate modulation scheme and coding rate which maintain constant bit error rate
lower than the requested BER. Simulation results show that better performance is confirmed for target bit error rate (BER) of (10-3) as compared to c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Performance Improvement for Wireless Sensor Networks
...Show More Authors

In this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la

... Show More
View Publication Preview PDF
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Technique for Solving Autonomous Equations
...Show More Authors

This paper demonstrates a new technique based on a combined form of the new transform method with homotopy perturbation method to find the suitable accurate solution of autonomous Equations with initial condition.  This technique is called the transform homotopy perturbation method (THPM). It can be used to solve the problems without resorting to the frequency domain.The implementation of the suggested method demonstrates the usefulness in finding exact solution for linear and nonlinear problems. The practical results show the efficiency and reliability of technique and easier implemented than HPM in finding exact solutions.Finally, all algorithms in this paper implemented in MATLAB version 7.12.

 

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Legal Sciences
Standard Protection for the Human Genome
...Show More Authors

The legal protection of the human genome is an ethical issue related to the future of human existence.  After the disclosure of the human genetic map, scientific practices and research related to the human genome increased, especially the negative applications of genetic engineering that violates basic human rights, especially the right to human dignity, and pose real challenges to the existence and diversity of  Present and future generations. Therefore, the existence of legal rules at the national and international levels is an absolute necessity to prohibit these threats and to arrange civil and criminal liability for those who violate them.

View Publication Preview PDF