Preferred Language
Articles
/
bsj-2318
Synthesis and Characterization of some New 1,3,4-Oxadiazole derivatives based on 4-amino benzoic acid
...Show More Authors

Various of 2,5- disubstituted 1,3,4-oxadiazole (Schiff base, ?- lactam and azo) were synthesized from 2,5-di (4,4?-amino-1,3,4-oxadiazole which usequently synth-esized from mixture of 4- amino benzoic acid and hydrazine arch of polyphosphorus acid. The synthesized compounds were cherecterized by using some spectral data (UV, FT-IR , and 1H-NMR)

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
مؤتمر النسوي الثالث / كلية العلوم للبنات
Synthesis , Characterization and study of Biological Activities of Mixed Ligand-Complexes of Saccharin and Trimethoprim with Ni(II),Co(II),Cu(II), Hg(II) and Cd(II)
...Show More Authors

Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
A Blended Learning Program Based on the Next Generation Standards (NYS) to Develop the Teaching Performance of Middle School Mathematics Teachers and Some Students’ Future Thinking Skills
...Show More Authors

Abstract

The aim of the current research is to prepare an integrated learning program based on mathematics standards for the next generation of the NYS and to investigate its impact on the development of the teaching performance of middle school mathematics teachers and the future thinking skills of their students. To achieve the objectives of the research, the researcher prepared a list of mathematics standards for the next generation, which were derived from a list of standards. He also prepared a list of the teaching competencies required for middle school mathematics teachers in light of the list of standards, as well as clarified the foundations of the training program and its objectives and the mathematical

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Development of Japanese Military Abitity and its Reflection on the New Japanese Role
...Show More Authors

خلاصة (استطاعت اليابان بعد الحرب العالمية الثانية ان تنهض من جديد، وان تحقق تجربة تحديث سياسي جعلها تشهد تبدلات جذرية من الفقر الى الغنى ومن سيطرة الحكم العسكري الى الدولة المنزوعة السلاح ومن التخلف الى التكنولوجيا الاكثر تطورا في العالم, ومن الانغلاق والعزلة وذهنية سكان الجزر الى الانفتاح على ثقافات عصر العولمة ووسائل اعلامها. فكيف يمكن الاستفادة من هذه التجربة الحديثة سياسيا بل وحتى اقت

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ESTIMATION OF ELLAGIC ACID ACTIVITY WHEN MIXED WITH SOME TYPES OF CANDY AGAINST Streptococcus mutans ISOLATED FROM ADULT PATIENTS IN BAGHDAD CITY: ESTIMATION OF ELLAGIC ACID ACTIVITY WHEN MIXED WITH SOME TYPES OF CANDY AGAINST Streptococcus mutans ISOLATED FROM ADULT PATIENTS IN BAGHDAD CITY
...Show More Authors

Microbial activity of Ellagic acid when mixed with some types of candy toward Streptococcus mutans microorganism was studied. The main purpose of carrying out this study is to produce a new type of candy that contains Ellagic acid in addition to xylitol instead of sucrose to prevent dental caries. The results show that the inhibitory action of Ellagic acid was more effective when mixed with this type of candy for the purpose of reducing Streptococcus mutans microorganisms, while sensory evaluation was applied in this study to 20 volunteers to that candy sample evaluated which contain (5 mg/ml) Ellagic acid with 100g xylitol to determine consumers acceptability of this sample of candy. The results were expressed as mean value, slandered d

... Show More
View Publication Preview PDF