Preferred Language
Articles
/
dRbXB4cBVTCNdQwCMDCv
LSB based audio steganography preserving minimum sample SNR
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Jun 08 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Sonographic assessment of normal cervical lymph nodes in a sample of Syrian population
...Show More Authors

Background: Sonographic examination is an important tool in assessment of normal and abnormal cervical lymph nodes. The aim of the study is to assess the distribution and the characteristic features of normal cervical lymph nodes in a sample of Syrian population. Materials and Methods: Fifty healthy Syrian subjects (25 men and 25 women) with an age of 20 -60years old, who had their cervical lymph nodes examined by ultrasound. Three hundred and two lymph nodes were detected. Lymph nodes were evaluated for their number, size, site, echogenic hilus, shape, as well as for the border sharpness. The subjects were categorized by age into four groups, (20 -30, 31 - 40 , 41 - 50 , 51- 60 years ). Statistical analysis of data was done using SP

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2015
Journal Name
Iosr Journal Of Dental And Medical Sciences
Prevalence of prediabetes and metabolic syndrome and their association in an Iraqi sample
...Show More Authors

Abstract: Background: Prediabetes and are increasing in prevalence all over the world, they each carry risks to the future development of diabetes mellitus and cardiovascular disease. These risks will be greatly exaggerated if they occur together in the same individual. The aim of the study was to find the prevalence and the association of prediabetes and metabolic syndrome, in addition to analyzing the correlation of the risk factors that lead to their development. Material and Methods: This was a cross-sectional, simple random study that included 300 Iraqi individuals, aged between 30-75 years, who accepted to take part in this study were recruited. Result: Prevalence of prediabetes and metabolic syndrome was (33.66%) and (42%) r

... Show More
Publication Date
Tue Jan 08 2019
Journal Name
Lubricants
Influence of Sample Mixing Techniques on Engine Oil Contamination Analysis by Infrared Spectroscopy
...Show More Authors

For the most reliable and reproducible results for calibration or general testing purposes of two immiscible liquids, such as water in engine oil, good emulsification is vital. This study explores the impact of emulsion quality on the Fourier transform infrared (FT-IR) spectroscopy calibration standards for measuring water contamination in used or in-service engine oil, in an attempt to strengthen the specific guidelines of ASTM International standards for sample preparation. By using different emulsification techniques and readily available laboratory equipment, this work is an attempt to establish the ideal sample preparation technique for reliability, repeatability, and reproducibility for FT-IR analysis while still considering t

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Dec 22 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Belief about Medicines among a Sample of Iraqi Patients with Rheumatoid Arthritis
...Show More Authors

Rheumatoid arthritis is a chronic, progressive, inflammatory autoimmune disease of unidentified etiology, associated with articular, extra-articular and systemic manifestation that require long-standing treatment. Taking patient’s beliefs about the prescribed medication in consideration had been shown to be an essential factor that affects adherence of the patient in whom having positive beliefs is an essential for better adherence. The purpose of the current study was to measure beliefs about medicines among a sample of Iraqi patients with Rheumatoid arthritis and to determine possible association between this belief and some patient-certain factors. This study is a cross-sectional study carried out on 250 already diagnosed rheumatoid

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (10)
Scopus Crossref
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of Mouth Rinses on Surface Roughness of Two Methacrylate-Based and Siloraine-Based Composite Resins
...Show More Authors

Background: Various fluids in the oral environment can affect the surface roughness of resin composites. This in vitro study was conducted to determine the influence of the mouth rinses on surface roughness of two methacrylate-based resin (nanofilled and packable composite) and siloraine-based resin composites.

Materials and methods: Disc-shaped specimens (12 mm in diameter and 2mm in height) were prepared from three types of composi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

     Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd  level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Signature Verification Based on Moments Technique
...Show More Authors

In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (12)
Crossref (5)
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref