Preferred Language
Articles
/
bsj-2411
Measurement of Indoor Radon Gas Concentration in same Region of Baghdad Governorate Using CR-39 Nuclear Track Detector
...Show More Authors

In this research the activity of radon gas in air in Baghad governorate,Iraq, using “alpha-emitters track registration (CR-39) track detector were measured. This measurement was done for selected areas from Baghdad Governorate, The results obtained shows that the highest average concentrations for Rn-222 is (179.077 Bq/m^3) which was recorded within Al-Shaaib city and less average concentrations was (15.79 Bq/m^3) in the nearby residential area of Baghdad International Airport and the overall average concentrations is (86.508 Bq/m^3) for these regions. Then the radon concentration was measured annual effective dose calculated from radon concentration and found in range from 0.4031 mSv/y to 4.5179 mSv /y with an average value of 2.1824 mSv/y. The annual effective dose of radon was within the allowed international limits.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Visible image watermarking using biorthogonal wavelet transform
...Show More Authors

In this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was s

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Data Mining, Modelling And Management
Association rules mining using cuckoo search algorithm
...Show More Authors

Association rules mining (ARM) is a fundamental and widely used data mining technique to achieve useful information about data. The traditional ARM algorithms are degrading computation efficiency by mining too many association rules which are not appropriate for a given user. Recent research in (ARM) is investigating the use of metaheuristic algorithms which are looking for only a subset of high-quality rules. In this paper, a modified discrete cuckoo search algorithm for association rules mining DCS-ARM is proposed for this purpose. The effectiveness of our algorithm is tested against a set of well-known transactional databases. Results indicate that the proposed algorithm outperforms the existing metaheuristic methods.

View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Thu Sep 30 2010
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
TREATING THE USED AUTOMOBILES OILS USING SOLVENTS
...Show More Authors

Used automobile oils were subjected to filtration to remove solid material and dehydration to remove water, gasoline and light components by using vacuum distillation under moderate pressure, and then the dehydrated waste oil is subjected to extraction by using liquid solvents. Two solvents, namely n-butanol and n-hexane were used to extract base oil from automobile used oil, so that the expensive base oil can be reused again.
The recovered base oil by using n-butanol solvent gives (88.67%) reduction in carbon residue, (75.93%) reduction in ash content, (93.73%) oil recovery, (95%) solvent recovery and (100.62) viscosity index, at (5:1) solvent to used oil ratio and (40 oC) extraction temperature, while using n-hexane solvent gives (6

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Offline signatures matching using haar wavelet subbands
...Show More Authors

The complexity of multimedia contents is significantly increasing in the current world. This leads to an exigent demand for developing highly effective systems to satisfy human needs. Until today, handwritten signature considered an important means that is used in banks and businesses to evidence identity, so there are many works tried to develop a method for recognition purpose. This paper introduced an efficient technique for offline signature recognition depending on extracting the local feature by utilizing the haar wavelet subbands and energy. Three different sets of features are utilized by partitioning the signature image into non overlapping blocks where different block sizes are used. CEDAR signature database is used as a dataset f

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
Human Dynamic Behavior: Reconstruction Trajectories Using CDRs
...Show More Authors
Abstract<p>Investigating the human mobility patterns is a highly interesting field in the 21th century, and it takes vast attention from multi-disciplinary scientists in physics, economic, social, computer, engineering…etc. depending on the concept that relates between human mobility patterns and their communications. Hence, the necessity for a rich repository of data has emerged. Therefore, the most powerful solution is the usage of GSM network data, which gives millions of Call Details Records gained from urban regions. However, the available data still have shortcomings, because it gives only the indication of spatio-temporal data at only the moment of mobile communication activities. In th</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Public key system by using isomorphism group
...Show More Authors

In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Plant Archives
Schistosomiasis vector control using cucumis melo plantextractswithbioassayexperiment
...Show More Authors

he aim of this study is to get a plant extracts to use it as molluscicides to control the snail vector of Schistosomiasis andfinely control the disease. Laboratory study was performed to compare the molluscicidal activity of leaves and stems extractsof Cucumis melo against Bulinus truncatus snail. The snail B. truncatus was exposed to a serial concentrations of leaves andstems extracts (4000ppm, 5000ppm) in this work. Different effects of the extracts to the snail B. truncatus were recorded.These effects includes death, escaping and imbalance of snail behavior. 96hr-LD50 values of leaves extracts were calculatedfor the doses 4000 and 5000ppm as (76 and 37%) respectively while for stems were (105 and 47%) respectively. We found thatthe snail

... Show More
View Publication
Scopus
Publication Date
Wed Sep 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Using Ultraviolet Technique for Well Water Disinfection
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Genetic--Based Face Retrieval Using Statistical Features
...Show More Authors

Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Object Filling Using Table Based Boundary Tracking
...Show More Authors

The feature extraction step plays major role for proper object classification and recognition, this step depends mainly on correct object detection in the given scene, the object detection algorithms may result with some noises that affect the final object shape, a novel approach is introduced in this paper for filling the holes in that object for better object detection and for correct feature extraction, this method is based on the hole definition which is the black pixel surrounded by a connected boundary region, and hence trying to find a connected contour region that surrounds the background pixel using roadmap racing algorithm, the method shows a good results in 2D space objects.
Keywords: object filling, object detection, objec

... Show More
View Publication Preview PDF