Preferred Language
Articles
/
jcoeduw-887
Comparative Study of Image Denoising Using Wavelet Transforms and Optimal Threshold and Neighbouring Window
...Show More Authors

NeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among other wavelet functions. The system was implemented using
MATLAB R2010a. The average improvement in term of PSNR between Haar and other
wavelet functions is 1.37dB

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Iraq Journal Of Agricultural Research
THE COMPARATIVE STUDY OF THE TOTAL COSTS AND NET REVENUE OF DIFFERENT TILLAGE SYSTEMS USING TWO TYPES OF SEEDLINGS IN THE PRODUCTION OF BARLEY GREEN VARIETY SAMEER IN THE GYPSUM SOILS
...Show More Authors

Publication Date
Mon Dec 30 2019
Journal Name
College Of Islamic Sciences
Extremism in religion Causes, effects and treatment
...Show More Authors

Praise be to God, Lord of the worlds, and prayers and peace be upon His messenger, the mercy of the worlds.
As for after ....
It is clear from the legal texts in the Noble Qur’an and the Sunnah of the Prophet, that Islam is a method that interferes in everything in beliefs, worship, behavior and transactions, and it forbids excess and extremism and mistrust of people and looking at them through a black lens, self-conceit and contempt of others.
In our research, we will try, God willing, to study the phenomenon of religious extremism with its comprehensive dimensions, the position of Islam on it through the verses and hadiths discussed by it, and the diagnosis of the reasons for its emergence and emergence, because if we learn

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Analyzing the impact of exchange rate fluctuations and inflation on the GDP in Iraq using the modern methodology of Cointegration for the period (1988-2020)
...Show More Authors

     The research aims to analyze the impact of exchange rate fluctuations (EXM and EXN) and inflation (INF) on the gross domestic product (GDP) in Iraq for the period 1988-2020. The research is important by analyzing the magnitude of the macroeconomic and especially GDP effects of these variables, as well as the economic effects of exchange rates on economic activity. The results of the standard analysis using the ARDL model showed a long-term equilibrium relationship, according to the Bound Test methodology, from explanatory (independent) variables to the internal (dependent) variable, while the value of the error correction vector factor was negative and moral at a level less than (1%). The relationship bet

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Nov 05 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Regulation of HbA1c of uncontrolled diabetic type II obese and normal weight patients by oral hygiene performance (Comparative study)
...Show More Authors

Background: The association between periodontal diseases incidence and development and the metabolic diseases as Diabetes Mellitus and Obesity are recently have attract great deal of researchers attention and investigation. The periodontal health proved to reduce the systemic inflammatory reactions and positively improve the glycemic control of diabetes Type2 patients. The aim of the study was to investigate the influence of oral hygiene control on the glycemic control of obese and normal weight moderately controlled Diabetic Type 2 patients, in addition to study the association of obesity with the gingival inflammation. Materials and Methods: Cross sectional study of three months duration. Included 30 moderately controlled diabetic type2 p

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 05 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Accuracy of spiral computed tomography in evaluation of maxillary sinus septa among dentate and edentulous Iraqi subjects (Comparative study)
...Show More Authors

Background: Presence of maxillary sinus septa has been known to be a complicating factor for sinus elevation procedure and implant placement in posterior maxilla. The maxillary sinuses septa are thin walls of cortical bone inside the sinus. They vary in number, location, and height. This study aimed to discover the accuracy of Spiral Computed Tomographic Scan in evaluation the maxillary sinus septa (prevalence, location, height) in subjects with dentate, partially edentulous and completely edentulous maxilla. Material and method: This study included (267) subjects ranged from (20-70 years), (132) male and (135) female divided into three groups, (97) fully dentate group, (102) partially edentulous group and (68) completely edentulous group w

... Show More
View Publication Preview PDF
Publication Date
Mon May 29 2023
Journal Name
Rawal Medical Journal
Comparative prospective study of knee pain in medial pararpatellar and transpatellar entry for interlocking nail fixation of tibia fracture
...Show More Authors

Objective: To compare two insertion techniques of intramedullary interlocking nails (medial parapatellar versus intrapatellar insertion) in patients with tibial fractures. Methodology: This study was performed at Al-Kindy Teaching Hospital from August 2020 until March 2022. All 32 patients with tibial fractures (29 males and 3 females) were included for tibial closed nail fixation and then followed up for 6 months. We categorized these patients into two groups; Group A (16 patients), those treated by medial parapatellar insertion of an interlocking nail, and Group B (16 patients) with transpatellar tibial nail insertion. All patients were treated by the same surgical team. Results: The range of movement in two weeks (from extension

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
A Study of a-Si:H Absorption Edge Using Dunstan’s Model
...Show More Authors

The optical absorption data of Hydrogenated Amorphous Silicon was analyzed using a Dunstan model of optical absorption in amorphous semiconductors. This model introduces disorder into the band-band absorption through a linear exponential distribution of local energy gaps, and it accounts for both the Urbach and Tauc regions of the optical absorption edge.Compared to other models of similar bases, such as the O’Leary and Guerra models, it is simpler to understand mathematically and has a physical meaning. The optical absorption data of Jackson et al and Maurer et al were successfully interpreted using Dunstan’s model. Useful physical parameters are extracted especially the band to the band energy gap , which is the energy gap in the a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Ordinary Methods (LS,IV) and Robust Methods (2SWLS,LTS,RA) to estimate the Parameters of ARX(1,1,1) Model for Electric Loads
...Show More Authors

 

Abstract:

The models of time series often suffer from the problem of the existence of outliers ​​that accompany the data collection process for many reasons, their existence may have a significant impact on the estimation of the parameters of the studied model. Access to highly efficient estimators  is one of the most important stages of statistical analysis, And it is therefore important to choose the appropriate methods to obtain good  estimators. The aim of this research is to compare the ordinary estimators and the robust estimators of the estimation of the parameters of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cyber security technology and the reflection of its application on the quality of financial reports: An exploratory study of a sample of internal and external auditors
...Show More Authors

Abstract

                 This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an

... Show More
View Publication Preview PDF