Preferred Language
Articles
/
ijs-6145
Auto Crop and Recognition for Document Detection Based on its Contents
...Show More Authors

An Auto Crop method is used for detection and extraction signature, logo and stamp from the document image. This method improves the performance of security system based on signature, logo and stamp images as well as it is extracted images from the original document image and keeping the content information of cropped images. An Auto Crop method reduces the time cost associated with document contents recognition. This method consists of preprocessing, feature extraction and classification. The HSL color space is used to extract color features from cropped image. The k-Nearest Neighbors (KNN) classifier is used for classification. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Al–bahith Al–a'alami
The propaganda content of the elements of expression in the face of the promotion of terrorist thought: (Military information of the popular crowd model)
...Show More Authors

The propaganda war is one of the most dangerous weapons used in various conditions of war and peace within any intellectual, political or military conflict to be targeted by multiple social groups and their effects on the intellectuals to change the viewpoints at the local and global level, including the use of technical treatment of the audio and visual medium, The impact of the psychological dimensions of the arms in the confrontation and spread terror in the ranks of the enemies and in the forefront of what Iraq faces in its battle against the And the use of it as a propaganda content contributes to the development of the spirit of tranquility and tranquility in the hearts of Iraqis and the return of the right to the owners “th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Mar 13 2021
Journal Name
Al-nahrain Journal Of Science
Hiding Multi Short Audio Signals in Color Image by using Fast Fourier Transform
...Show More Authors

Many purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa

... Show More
View Publication
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption
...Show More Authors

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages (jcl)
A study of the nomenclature of Russian vocabulary of Arabic origin denoting some religious worship, or denoting some political and social positions: «Лексика арабского происхождения со значением «служители религиозного культа, социального статуса» и её функционирование в русской речи»
...Show More Authors

      The present paper discusses one of the most important Russian linguistic features of Arabic origin Russian lexes denoting some religious worship or some political and social positions like Qadi, Wally, Sultan, Alam, Ruler, Caliph, Amir, Fakih, Mufti, Sharif, Ayatollah, Sheikh.. etc.  A lexical analysis of the two of the most efficient and most used words of Arabic origin Russian lexes that are “Caliph and Sheikh” is considered in the present study. The lexicographic analysis of these words makes it possible to identify controversial issues related to their etymology and semantic development.

The study is conducted by the use of the modern Russian and Arabic dictionary, specifically, (Intermediate lexicon Dictionary

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
The Surgical outcomes of fundus-first technique in lowering the rate of bile duct injuries and bleeding during open cholecystectomy that facing intraoperative difficulties: A single-center prospective study: The surgical outcomes of open fundus-first cholecystectomy technique.
...Show More Authors

Background: The problem of difficult gallbladder is not clearly defined and associated with real missing of therapeutic approaches that decreased morbidity. Moreover, the difficult gallbladder was reported as a contributing risk factor for biliary injury due to raised difficulty in surgical dissection within Calot’s triangle. The aim of this study is to determine the surgical outcomes of the open fundus-first cholecystectomy in lowering the rate of lethal intraoperative risks.

Subjects and Methods: Our prospective study conducted during the period of January 2019 to December 2022 at Ibn Sina specialized hospital, Khartoum, Sudan, for two hundred and fifty-three patients underw

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri May 01 2020
Journal Name
مجلة بحوث الشرق الأوسط
دراسة مقارنة لمستوى التمکین الإداری بین مشرفی التربیة الریاضیة (الاختصاص والفنی) لمدیریات التربیة فی محافظة بغداد A Comparative Study of the Level of Administrative Empowerment between the Physical Education Supervisors (Specialization and Technical) of Education Directorate in Baghdad Governorate
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Determination of Ascorbic Acid (Vitamin C) by Direct Injection Enthalpimetry (DIE) Technique The ascorbic acid content of juices of some fruits and pharmaceutical tablets of Vitamin C was determined by a homemade apparatus of DIE technique using a thermoc
...Show More Authors

The ascorbic acid content of juices of some fruits and pharmaceutical tablets of Vitamin C was determined by a homemade apparatus of DIE technique using a thermocouple as heat sensor. The method is simple, speed, low cost and the different types of turbid, colored samples can be analyzed without any problem. The results were of a valuable accuracy and precision, and the recovery of results was with acceptable values

View Publication Preview PDF
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
A Criticism and study of “The Arabic translations of contemporary Persian novels” (“Translations of Muhammad Alauddin Mansour” as a model): قنقـــد و بررسی ترجمـــــه¬ی عربی رمــــان¬های معـــــاصر فــــارسی (ترجمه¬های محمد علاء الدین منصور- بررسی نمونه¬ای)
...Show More Authors

     Arab translators have always paid great attention to the translation of the Persian literary genres, in particular, contemporary Iranian novels. They have always translated for the most prominent Iranian novelists such as Jalal Al Ahmad, Sadiq Hidayat, Mahmoud Dowlatabadi, Bozorg Alavi, Ismail Fasih‎, Houshang Golshiri, Gholam-Hossein Saedi, Simin Daneshvar, Sadiq Chubak, Samad Behrangi and others that have succeeded in perfectly picturing the Iranian society.

      Within the perspectives of Arab translators and by using the descriptive - analytical approach, the present study provides an analytical study of the translation into Arabic some of the modern Persian novels. Moreove

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Using SWAT Model to Estimate the Water Balance of Wadi Al-Mohammadi Basin, Western Iraq: Setup of SWAT Model, SWAT Model Run, Watershed Delineation, Climate Data, Quantification of Hydrological Components, and Water Balance of the Wadi Al-Mohammadi Basin.
...Show More Authors

     Water balance as a technique is considered one of the means that is relied upon in solving significant hydrological problems. The soil and water assessment tool (SWAT) model was used in this study to assess the water balance in the Wadi Al-Mohammadi basin located at the eastern edge of the Western Desert. Digital elevation model, soil data, Land use - Land cover, and climate data represent the most important requirements for the SWAT model's input as a database. The Wadi Al-Mohammadi basin delineation results show the overall drainage area was 2286.8 km2 with seven sub-basins. The trend line of climate data indicates a clear increase in the total rainfall, relative humidity, temperature, and solar radiation from 1990-

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref