Preferred Language
Articles
/
bsj-1301
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image recovery after applying JPEG coding to the watermarking image are included.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
The Iraqi Journal Of Agricultural Science 48 (5), 1197-1205‏
Sex identification of date palm by using dna molecular markers
...Show More Authors

Publication Date
Sat Aug 01 2020
Journal Name
Key Engineering Materials
Quality Control of Production Lightweight Ferrocement Plate Using Sustainable Materials
...Show More Authors

This research is concerned with a new type of ferrocement characterized by its lower density and enhanced thermal insulation. Lightweight ferrocement plates have many advantages, low weight, low cost, thermal insulation, environmental conservation. This work contain two group experimental : first different of layer ferrocement, second different of ratio aggregate to cement. The experiments were made to determined the optimum proportion of cement and lightweight aggregate (recycle thermestone ). A low W/C ratio of 0.4 was used with super plasticizer conforming to ASTM 494 Type G. The compressive strength of the mortar mixes is 20-25 MPa. The work also involved the determination of thermal properties .Thermal conductivity value of thi

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Extraction of Oil from Eucalyptus Camadulensis Using Water Distillation Method
...Show More Authors

This work was conducted to study the extraction of eucalyptus oil from natural plants (Eucalyptus camaldulensis leaves) using water distillation method by Clevenger apparatus. The effects of main operating parameters were studied: time to reach equilibrium, temperature (70 to100°C), solvent to solid ratio (4:1 to 8:1 (v/w)), agitation speed (0 to 900 rpm), and particle size (0.5 to 2.5 cm) of the fresh leaves, to find the best processing conditions for achieving maximum oil yield. The results showed that the agitation speed of 900 rpm, temperature 100° C, with solvent to solid ratio 5:1 (v/w) of particle size 0.5 cm for 160 minute give the highest percentage of oil (46.25 wt.%). The extracted oil was examined by HPLC.

View Publication Preview PDF
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
Bayesian Tobit Quantile Regression Model Using Four Level Prior Distributions
...Show More Authors

Abstract:

      In this research we discussed the parameter estimation and variable selection in Tobit quantile regression model in present of multicollinearity problem. We used elastic net technique as an important technique for dealing with both multicollinearity and variable selection. Depending on the data we proposed Bayesian Tobit hierarchical model with four level prior distributions . We assumed both tuning parameter are random variable and estimated them with the other unknown parameter in the model .Simulation study was used for explain the efficiency of the proposed method and then we compared our approach with (Alhamzwi 2014 & standard QR) .The result illustrated that our approach

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2015
Journal Name
Journal Of Engineering
Indoor Positioning and Monitoring System Using Smartphone and WLAN (IPMS)
...Show More Authors

 

Buildings such as malls, offices, airports and hospitals nowadays have become very complicated which increases the need for a solution that helps people to find their locations in these buildings. GPS or cell signals are commonly used for positioning in an outdoor environment and are not accurate in indoor environment. Smartphones are becoming a common presence in our daily life, also the existing infrastructure, the Wi-Fi access points, which is commonly available in most buildings, has motivated this work to build hybrid mechanism that combines the APs fingerprint together with smartphone barometer sensor readings, to accurately determine the user position inside building floor relative to well-known lan

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2011
Journal Name
Al-khwarizmi Engineering Journal
Noise Removal of ECG Signal Using Recursive Least Square Algorithms
...Show More Authors

This paper shows an approach for Electromyography (ECG) signal processing based on linear and nonlinear adaptive filtering using Recursive Least Square (RLS) algorithm to remove two kinds of noise that affected the ECG signal. These are the High Frequency Noise (HFN) and Low Frequency Noise (LFN). Simulation is performed in Matlab. The ECG, HFN and LFN signals used in this study were downloaded from ftp://ftp.ieee.org/uploads/press/rangayyan/, and then the filtering process was obtained by using adaptive finite impulse response (FIR) that illustrated better results than infinite impulse response (IIR) filters did.

View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Tue Dec 28 2021
Journal Name
2021 2nd Information Technology To Enhance E-learning And Other Application (it-ela)
Pedestrian and Objects Detection by Using Learning Complexity-Aware Cascades
...Show More Authors

View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Desalination And Water Treatment
Reducing endotoxin from dialysis water by using different disinfection processes
...Show More Authors

View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Jan 15 2020
Journal Name
Iraqi Journal Of Laser
Hole Drilling of High Density Polyethylene using Nd:YAG Pulsed Laser
...Show More Authors

This paper presents the theoretical and experimental results of drilling high density
polyethylene sheet with thickness of 1 mm using millisecond Nd:YAG pulsed laser. Effects of laser
parameters including laser energy, pulse duration and peak power were investigated. To describe and
understand the mechanism of the drilling process Comsol multiphysics package version 4.3b was used to
simulate the process. Both of the computational and experimental results indicated that the drilling
process has been carried out successfully and there are two phases introduced in the drilling process,
vaporization and melting. Each portion of these phases depend on the laser parameters used in the
drilling process

View Publication Preview PDF