Preferred Language
Articles
/
ijs-911
Using Geographic Information System (GIS) to estimate the volume of water for Al Dammam unconfined Aquifer within Al Salman basin, Al- Muthana Governorate, South West Iraq
...Show More Authors

The groundwater represents the main source of water in the study area due to lack of surface water. The Dammam unconfined aquifer represents the main aquifer in the study area and Southern desert because of the regional extent, the quantity and quality of water. Many groundwater wells have been drilled in the study area to coverage the huge demand of water for agricultural purposes. The Geographic Information System (GIS) was used to estimate the volume of water which calculated (25.6964 × 109 m3) within the study area , automate calculation of the area of Al Salman basin using digital elevation models, derive the thickness maps of Al
Dammam unconfined aquifer from Key holes (KH) and Bore holes (BH), draw the groundwater head and flow map in the study area. Such data derived from GIS can help authorities and researchers for groundwater management and further development within the study area.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Attacking Jacobian Problem Using Resultant Theory
...Show More Authors

     This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type:  ,            and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Edge Detection Using Circular Sliding Window
...Show More Authors

    In this paper, we devoted to use circular shape sliding block, in image edge determination. The circular blocks have symmetrical properties in all directions for the mask points around the central mask point. Therefore, the introduced method is efficient to be use in detecting image edges, in all directions curved edges, and lines. The results exhibit a very good performance in detecting image edges, comparing with other edge detectors results.

View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 27 2023
Journal Name
Tem Journal
Predicting Age and Gender Using AlexNet
...Show More Authors

Due to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many application

... Show More
View Publication
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Assessment of ISNAG fluorimeter (Total fluorescence measurements at+ 90° & - 90° using four solar cell on each side for 100mm distance at 2mm path length) with well-known fluorescent molecules via CFIA
...Show More Authors

Two well-known fluorescent molecules: fluorescein sodium salt (FSS) and 2,7-dichloro fluorescein (DCF) were tried to prove the efficiency, trustability and repeatability of ISNAG fluorimeter by using discrete and continuous flow injection analysis modes.A linear range of 0.002-1 mmol/L for FSS and 0.003-0.7 mmol/L was for DCF, with LOD 0.0018 mmol/L and 0.002 mmol/L for FSS and DCF respectively, were obtained for discrete mode of analysis. While the continuous mode gave a linear range of 0.002-0.7 mmol/L and 0.003-0.5 mmol/L for FSS and DCF respectively, the LOD were 0.0016mmol/L and 0.0018 mmol/L for FSS and DCF respectively. The results were compared with classical method at variable λex for both fluorescent molecules at 95

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Technical requirements for the application of economic intelligence and its impact On the dimensions of strategic success of banks: An applied research on a sample of Iraqi banks private
...Show More Authors

This research sheds light on one of the important and vital topics for the banking sectors (technical requirements for the application of economic intelligence) namely by (Hardware, equipment, communication networks, software, databases). And the dimensions of the strategic success of the banks represented by(Customer satisfaction, customer trust, quality of service, growth) In the three Iraqi private banks, namely(Assyria International Investment, Mansour Investment, International Development Investment and Finance). Its implementation is an urgent necessity in order to improve the quality of its banking services to win the satisfaction of its customers and their confidence and then grow to achieve stra

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Managerial Skills and It`s Role in Strengthening the Competitive Edge of Companies: A Case Study in the General Company for Construction Industries
...Show More Authors

This research tries to reveal how to manage and control the competitive edge for business by building managerial skills in various organizational levels. Our research aims at finding out the nature of various technical, human and in tellectual skills of a new president whose superiority is his competitive ness in the application field at general company for construe tioual  industriesand testing the surveyed minor and major changes through a questionnaire to collect information from officials. The sample was composed of (45) director. The data was analyzed  using some methods and statistical programs. The most prominent of these is (SPSS) that was used to extract the arithmetic mean, standard deviation, correlation coefficient

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The contractual budget: the ideal technique in planning and implementing capital budgeting projects: a strategy of preparing the contractual budget for Baghdad local government
...Show More Authors

Public budget is the government's tool in achieving the objectives of economic and social development is the accounting curriculum to estimate state revenues and expenditures for years to come, as well as to have legal status as it is after the adoption of an official statement of government units to spend funds on items planned at the same time is a statement collect resources to finance these appropriations, if the primary objective of the budget initially limited to the achievement of financial and legislative control have evolved this function in the area of public administration turned attention from mere imposition of control over the money, which provides information to assist the Department to utilize available resources and prog

... Show More
View Publication Preview PDF