Preferred Language
Articles
/
jcoeduw-856
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
COMPUTER-BASED ECG SIGNAL ANALYSIS AND MONITORING SYSTEM
...Show More Authors

This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagno

... Show More
View Publication Preview PDF
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Dec 02 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability
Effect of thickness variation CdO/PSi thin films on detection of radiation
...Show More Authors

CdO films were deposited on substrates from glass, Silicon and Porous silicon by thermal chemical spray pyrolysis technique with different thicknesses (130 and 438.46) nm. Measurements of X-ray diffraction of CdO thin film proved that the structure of the Polycrystalline is cubic lattice, and its crystallite size is located within nano scale range where the perfect orientation is (200). The results show that the surface’s roughness and the root mean square increased with increasing the thickness of prepared films. The UV-Visible measurements show that the CdO films with different thicknesses possess an allowed direct transition with band gap (4) eV. AFM measurement revealed that the silicon porosity located in nano range. Cadmium oxide f

... Show More
Scopus (2)
Scopus
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Chalcogenide Letters
Influence of Al dopant on structural and optical parameters of AgInSe2 thin film
...Show More Authors

Chalcopyrite thin films ternary Silver Indium Diselenide AgInSe2 (AIS) pure and Aluminum Al doped with ratio 0.03 was prepared using thermal evaporation with a vacuum of 7*10-6 torr on glass with (400) nm thickness for study the structural and optical properties. X-ray diffraction was used to show the inflance of Al ratio dopant on structural properties. X-ray diffraction show that thin films AIS pure, Al doped at RT and annealing at 573 K are polycrystalline with tetragonal structure with preferential orientation (112). raise the crystallinity degree. AFM used to study the effect of Al on surfaces roughness and Grain Size Optical properties such as the optical band gap, absorption coefficient, Extinction coefficient, refractive ind

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2014
Journal Name
International Journal Of Innovative Research In Science, Engineering And Technology
EFFECT AMBIENT OXIDATION ON STRUCTURAL AND OPTICAL PROPERTIES OF COPPER OXIDE THIN FILMS
...Show More Authors

The structural, optical properties of copper oxide thin films ( CuO) thin films which have been prepared by thermal oxidation with exist air once and oxygen another have been studied. Structural analysis results of Cu thin films demonstrate that the single phase of Cu with high a crystalline structure with a preferred orientation (111). X-ray diffraction results confirm the formation of pure (CuO) phase in both methods of preparation. The optical constant are investigated and calculated such as absorption coefficient, refractive index, extinction coefficient and the dielectric constants for the wavelengths in the range (300-1100) nm.

Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Physical Mesomechanics Of Condensed Matter: Physical Principles Of Multiscale Structure Formation And The Mechanisms Of Nonlinear Behavior: Meso2022
Effect of L-cysteine capping the CdSe, CdSe:CdS on structural and morphological properties
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Effect of CuI concentration on structural and optical properties of PVA: CuI nanocomposites
...Show More Authors

The nanocomposite on the base of synthesis Copper iodide
nanoparticles and polyvinyl alcohol (PVA/CuI) with different
concentration of CuI were obtained using casting technique.
PVA/CuI polymer composite samples have been prepared and
subjected to characterizations using FTIR spectroscopy, The FTIR
spectral analysis shows remarkable variation of the absorption peak
positions with increasing CuI concentration. The obtained results by
X-ray diffraction indicated the formation of cubic CuI particles. The
effects of CuI concentrations on the optical properties of the PVA
films were studied in the region of wavelength, (190-1100) nm.
From the derivation of Tauc's relation it was found that the direct
allowed t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Publication Date
Thu May 18 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Steganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography

View Publication Preview PDF