Preferred Language
Articles
/
ijp-329
Data visualization and distinct features extraction of the comet Ison 2013
...Show More Authors

The distribution of the intensity of the comet Ison C/2013 is studied by taking its histogram. This distribution reveals four distinct regions that related to the background, tail, coma and nucleus. One dimensional temperature distribution fitting is achieved by using two mathematical equations that related to the coordinate of the center of the comet. The quiver plot of the gradient of the comet shows very clearly that arrows headed towards the maximum intensity of the comet.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Immediate Implant Placement in Fresh Extraction Socket
...Show More Authors

Background: In the traditional protocol, the patient should wait after extraction up to six months to place the dental implant in healed bone, this waiting time accompanied by varying degrees of alveolar bone changes. In order to overcome these problems, immediate implant placement in the fresh extraction socket was introduced. The Aim of this study was to evaluate the outcome of the immediate implant placement utilizing Resonance Frequency Analysis (RFA) to quantify implant stability and osseointegration. Materials and Methods: A total of (23) patients participated in the study, receiving (44) implants placed in the sockets of teeth indicated for extraction. Clinical and radiographic preoperative assessment was accomplished for each patie

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Oct 27 2020
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
AUTOMATIC ARABIC KEYWORD EXTRACTION USING LOGISTIC REGRESSION
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Alpha-Alumina Extraction from Al-Ga'ara Bauxite
...Show More Authors

The bauxite produced from Al-Ga 'ara area in Al-Enbar containing 50.4 wt. percentages Al2O3 was used for a- alumina production.                                                                                                

For α-alumina pro

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Research In Medical And Dental Science
The Efficacy of 4% Articaine Infiltration Anesthesia in the Extraction of Mandibular Molars: A Randomized Controlled Study
...Show More Authors

Introduction: Articaine was developed in 1969, with reported advantages which are increased potency, increased duration of its anesthetic effect and superior diffusion through bony tissue. The effectiveness of using 4% articaine infiltration for extraction of mandibular molar teeth in comparison to 2% lidocaine inferior alveolar nerve block is not settled yet. Aim: The aim of this study was to evaluate the effectiveness of using 4% articaine infiltration for extraction of mandibular molars by comparing it to the use of 2% lidocaine inferior alveolar nerve block in terms of success, the volume of local anesthetic agents and the pain experienced during the procedure. Materials and methods: A prospective randomized controlled study included

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed May 07 2025
Journal Name
Microbes And Infectious Diseases
Antibacterial activity of mentha piperita extraction against uropathogenic bacteria
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Feb 01 2011
Journal Name
Iop Conference Series: Materials Science And Engineering
Contour extraction of echocardiographic images based on pre-processing
...Show More Authors

In this work we present a technique to extract the heart contours from noisy echocardiograph images. Our technique is based on improving the image before applying contours detection to reduce heavy noise and get better image quality. To perform that, we combine many pre-processing techniques (filtering, morphological operations, and contrast adjustment) to avoid unclear edges and enhance low contrast of echocardiograph images, after implementing these techniques we can get legible detection for heart boundaries and valves movement by traditional edge detection methods.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 01 2008
Journal Name
Al-khwarizmi Engineering Journal
Extraction of Phenol From Industrial Water Using Different Solvents
...Show More Authors

The analysis and efficiency of phenol extraction from the industrial water using different solvents, were investigated. To our knowledge, the experimental information available in the literature for liquid-liquid equilibria of ternary mixtures containing the pair phenol-water is limited. Therefore the purpose of the present investigation is to generate the data for the water-phenol with different solvents to aid the correlation of liquid-liquid equilibria, including phase diagrams, distribution coefficients of phenol, tie-lines data and selectivity of the solvents for the aqueous phenol system.

                The ternary equilibrium diagrams and tie-lines

... Show More
View Publication Preview PDF