Preferred Language
Articles
/
j0JiIZoBMeyNPGM3JL0h
Improving the Performance and Finding Bitmap of the Compression Method Using Weber's law
...Show More Authors

Image compression is a suitable technique to reduce the storage space of an image, increase the area of storage in the device, and speed up the transmission process. In this paper, a new idea for image compression is proposed to improve the performance of the Absolute Moment Block Truncation Coding (AMBTC) method depending on Weber's law condition to distinguish uniform blocks (i.e., low and constant details blocks) from non-uniform blocks in original images. Then, all elements in the bitmap of each uniform block are represented by zero. After that, the lossless method, which is Run Length method, is used for compressing the bits more, which represent the bitmap of these uniform blocks. Via this simple idea, the result is improving the compression for the bitmap's size by reducing it, then reducing the bit rate further with a high ratio in compression and high speeding in the transition or storage while also retaining the reconstructed image quality.

Scopus Crossref
View Publication
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Variation of Compression Index and Swelling Index with Degree of Saturation in Unsaturated Soils
...Show More Authors

The variation of compression index Cc and swelling index Cs with the degree of saturation S was studied on unsaturated and fully saturated soils for different degrees of saturation (100%, 91%, 85%, 75%, 60%), several mathematical equations were found to describe these relationships, these equations can be used to predict settlement during the consolidation process in unsaturated and fully saturated soils.

 

View Publication Preview PDF
Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Results In Nonlinear Analysis
Numerical solutions for the time fractional Black-Scholes model governing European option by using double integral transform decomposition method
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 20 2022
Journal Name
Iraqi Journal Of Biotechnology
Green Method Synthesis of Silver Nanoparticles Using Leaves Extracts of Rosmarinus officinalis
...Show More Authors

The silver nanoparticles synthesized have to be handled by humans and must be available at cheaper rates for their effective utilization; thus, there is a need for an environmentally and economically feasible way to synthesize these nanoparticles. Therefore, this study aimed to synthesis of silver nanoparticles using phenolic compounds extracted from Rosmarinus officinalis. The maceration method and Soxhlet apparatus were used to prepare aqueous and methanolic Rosmarinus officinalis leaves extracts respectively, Furthermore, Rosmarinus officinalis silver nanoparticles (RAgNPs) were prepared from the aqueous and methanolic leaves extract of this plant and diagnosed using the ultraviolet (UV) spectroscopy, scanning electron microscopy (SEM),

... Show More
Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
Memorizer Keeper      And his method in his masterpiece      Supervision by the parties
...Show More Authors

What has reached us from this great heritage left by our scientists book ((masterpiece of honor by knowing the parties)) to the conservative privilege, which Imam Safadi said ((Sheikh of time, and the preservation of the era, and critic of the time, if his son Ibn Makola had a drink and eaten, and make it to him So, after trusting in God, I thought that I should write a paper highlighting the life of this great world and explaining its methodology in this useful book in which Imam Ibn Hajar al-Asqalani said: `` The use of it took place east and west, and the scholars competed in collecting it after. And soon)).

View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
Cooling Load Calculations For Typical Iraqi Roof And Wall Constructions Using Ashrae's RTS Method
...Show More Authors

The present work is an attempt to develop design data for an Iraqi roof and wall constructions using the latest ASHRAE Radiant Time Series (RTS) cooling load calculation method. The work involves calculation of cooling load theoretically by introducing the design data for Iraq, and verifies the results experimentally by field measurements. Technical specifications of Iraqi construction materials are used to derive the conduction time factors that needed in RTS method calculations. Special software published by Oklahoma state university is used to extract the conduction factors according to the technical specifications of Iraqi construction materials.  Good agreement between the average theoretical and measured cooli

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 11 2022
Journal Name
International Journal Of Professional Business Review
Measuring the Level of Performance of Accounting Units and Their Impact on the Control Environment
...Show More Authors

Purpose: The research aims to study the measurement of the performance of accounting units level of the research sample by using the Federal quality Model European (EFQM)   Design/methodology/approach: the (EFQM) which included seven dimensions "Leadership, Strategic Planning, External Focus, Information and Analysis, Faculty / Staff and Workplace Focus, Process Effectiveness & Outcomes and Achievements" And its effect on the Control Environment, which includes three dimensions: "Integrity, management philosophy and commitment to powers" . the sample is supervisory units of colleges affiliated with the University of Baghdad in Iraq, and a sample was chosen that included fifty-one individuals in the accounting departments.

... Show More
View Publication
Scopus (24)
Crossref (4)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Bild Law Journal
Law and its influential role for strategic leadership in managing security crises in Iraq
...Show More Authors

Scopus