Preferred Language
Articles
/
jcoeduw-46
Intellectual and Religious Characteristics Andalusion Societ Image Beni Al-Ahmar Era Poetry as a model
...Show More Authors

The intellectual and religious characteristics were an influential presence in the same Andalusian poet, especially among the poets of Beni El-Ahmar because they are part of the heritage of poets, and that is to push them towards the glory of this heritage and to take care of it and benefit from its inclusion, inspiration and similarity.

That this inflection on the poetic heritage is justified by the poets of the sons of the Red were inclined to preserve the inherited values, especially as it was related to their poetry, especially that the Andalusian poet did not find embarrassment in the inspiration of heritage and emerged when he mentioned the homes and the ruins and the camel and the journey, although the community Andalusian society is also urban and the religious aspect has a strong correlation in the language of the Koran, which made the Andalusian poet revolves in the orbit of holiness because of his religious culture has led stories and stories played a prominent role in lighting the text of poetry and clarify to the recipient, was a quote from the Quranic texts, Many all that took place in and around the text based on those images portrayed by the poet and he drew from the cultural and religious covenantal. With reference recently to the sources and references that included everything related to the research and its course.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Weighted k-Nearest Neighbour for Image Spam Classification
...Show More Authors

E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Image Encryption Based on Intelligent Session Mask Keys
...Show More Authors

The revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Reverse Engineering Representation Using an Image Processing Modification
...Show More Authors

In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Institutional Performance Assessment using a model of the European Foundation for Quality Management (EFQM) A case study at an organization
...Show More Authors

The study aims to use the European Excellence Model (EFQM) in assessing the institutional performance of the National Center for Administrative Development and Information Technology in order to determine the gap between the actual reality of the performance of the Center and the standards adopted in the model, in order to know the extent to which the Center seeks to achieve excellence in performance to improve the level of services provided and the adoption of methods Modern and contemporary management in the evaluation of its institutional performance.

The problem of the study was the absence of an institutional performance evaluation system at the centre whereby weaknesses (areas of improvement) and st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 28 2023
Journal Name
Mathematical Modelling Of Engineering Problems
Using Crushed Glass with Sand as a Single and Dual Filter Media for Removal of Turbidity from Drinking Water
...Show More Authors

View Publication
Publication Date
Sun Dec 17 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental Study Using the Passive Solar Chimney for Evaporative Cooling With PCM and CFM as a Thermal Energy Storage
...Show More Authors

 

      In this work, a test room was built in Baghdad city, with (2*1.5*1.5) m3  in dimensions, while the solar chimneys (SC) were designed with aspect ratio (ar) bigger than 12. Test room was supplied by many solar collectors; vertical single side of air pass with ar equals 25, and tilted 45o double side of air passes with ar equals 50 for each pass, both collectors consist of flat thermal energy storage box collector (TESB) that covered by transparent clear acrylic sheet, third type of collector is array of evacuated tubular collectors with thermosyphon in 45o instelled  in the bottom of TESB of vertical SC. The TESB was

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Civilizations and Environmental Particulars of Place in Islamic Holy Thresholds in Iraq (Alkadhumain Holy Threshold as a case study)
...Show More Authors

Islamic shrines architecture is one of the Islamic Architectural building types. It is called (Thresholds); (Atabat) in Arabic. Thoroughbred throughout the Islamic world from the east to west. In addition, it carries the style features and peculiarities of uniqueness from the rest of the types of Islamic architecture. By virtue of the particularity of its function as tomb for important person in Islamic history. Islamic shrines architecture has grown and evolved in started from the small shrines, and then taken to widen with the evolution of time in line with the value of the event and the rituals associated with it. Some of them to became centers of large cities of the largest in many parts of the Islamic world.

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 01 2019
Journal Name
Nanomedicine: Nanotechnology, Biology And Medicine
Listeria innocua Dps as a nanoplatform for bioluminescence based photodynamic therapy utilizing Gaussia princeps luciferase and zinc protoporphyrin IX
...Show More Authors

View Publication Preview PDF
Scopus (19)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Local wheat peel as a solid surface to remove Azure B dye from aqueous solution:Equilibrium isotherms and thermodynamic study
...Show More Authors

In this research local wheat peel was used as an adsorbent surface for removal of Azure B (AB) dye from the aqueous solution. The adsorption process was performed at different experimental parameters, equilibrium time, temperature, ionic strength and solution pH. The isotherms of adsorption are of H-type as compared with Giles curves and the adsorption data were coincide with Freundlich equation. The adsorption kinetic data were analyzed using pseudo- first and second order kinetic models. The effect of temperature was studied and the amount of dye adsorbed was found to increase with the increasing of temperature from 25 to 50 oC. The values of thermodynamic functions like enthalpy and entropy have been estimated. The quantity of adso

... Show More
View Publication Preview PDF
Crossref (2)
Crossref