Preferred Language
Articles
/
jcoeduw-887
Comparative Study of Image Denoising Using Wavelet Transforms and Optimal Threshold and Neighbouring Window
...Show More Authors

NeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among other wavelet functions. The system was implemented using
MATLAB R2010a. The average improvement in term of PSNR between Haar and other
wavelet functions is 1.37dB

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 08 2022
Journal Name
Al-khwarizmi Engineering Journal
Study of Microbial Desalination Cell Performance; Power Generation and Desalination Efficiency using Pure Oxygen in a Cathode Chamber
...Show More Authors

Microbial Desalination Cell (MDC) is capable of desalinating seawater, producing electrical power and treating wastewater. Previously, chemical cathodes were used, which were application restrictions due to operational expenses are quite high, low levels of long-term viability and high toxicity. A pure oxygen cathode was using, external resistance 50 and 150 k Ω were studied with two concentrations of NaCl in the desalination chamber 15-25 g/L which represents the concentration of brackish water and sea water. The highest energy productivity was obtained, which amounted to 44 and 46 mW/m3, and the maximum limit for desalination of saline water was (31% and 26%) for each of 25 g / L and 15 g / L, respectively, when using an ex

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Mon Dec 30 2019
Journal Name
College Of Islamic Sciences
Extremism in religion Causes, effects and treatment
...Show More Authors

Praise be to God, Lord of the worlds, and prayers and peace be upon His messenger, the mercy of the worlds.
As for after ....
It is clear from the legal texts in the Noble Qur’an and the Sunnah of the Prophet, that Islam is a method that interferes in everything in beliefs, worship, behavior and transactions, and it forbids excess and extremism and mistrust of people and looking at them through a black lens, self-conceit and contempt of others.
In our research, we will try, God willing, to study the phenomenon of religious extremism with its comprehensive dimensions, the position of Islam on it through the verses and hadiths discussed by it, and the diagnosis of the reasons for its emergence and emergence, because if we learn

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 08 2022
Journal Name
Multimedia Tools And Applications
Comparison study on the performance of the multi classifiers with hybrid optimal features selection method for medical data diagnosis
...Show More Authors

View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cyber security technology and the reflection of its application on the quality of financial reports: An exploratory study of a sample of internal and external auditors
...Show More Authors

Abstract

                 This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Image Watermarking based on Huffman Coding and Laplace Sharpening
...Show More Authors

In this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Wed Nov 05 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Caries severity in relation to oral health knowledge and behavior of third and fifth year dental students / University of Baghdad (A comparative study)
...Show More Authors

Background: Tooth wear is one of the most common problems in the older dentate population which results from the interaction of three processes (attrition, abrasion and erosion) and it affects all societies, different age groups, and all cultures. This study was achieved to evaluate the prevalence and distribution of tooth wear among institutionalized residents in Baghdad city\ Iraq. Subjects and Methods: This survey was accomplished on four private and one governmental institution in Baghdad city. One-hundred twenty three (61 males, 62 females) aged 50-89 years were participated in this study. The diagnosis and recording of tooth wear were according to criteria of Smith and Knight. Results: The prevalence of tooth wear was 100% with a mean

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Ordinary Methods (LS,IV) and Robust Methods (2SWLS,LTS,RA) to estimate the Parameters of ARX(1,1,1) Model for Electric Loads
...Show More Authors

 

Abstract:

The models of time series often suffer from the problem of the existence of outliers ​​that accompany the data collection process for many reasons, their existence may have a significant impact on the estimation of the parameters of the studied model. Access to highly efficient estimators  is one of the most important stages of statistical analysis, And it is therefore important to choose the appropriate methods to obtain good  estimators. The aim of this research is to compare the ordinary estimators and the robust estimators of the estimation of the parameters of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 14 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
10.28936 THe RELATIONSHIP BETWEEN TELEVISION ADVERTISING AND RANDOM BUYING FOR COSMETICS/ EXPLORATORY STUDY OF A SAMPLE OF WOMEN AT THE UNIVERSITY OF BAGHDAD.: THe RELATIONSHIP BETWEEN TELEVISION ADVERTISING AND RANDOM BUYING FOR COSMETICS/ EXPLORATORY STUDY OF A SAMPLE OF WOMEN AT THE UNIVERSITY OF BAGHDAD.
...Show More Authors

This research deals with the relationship between television advertising and buying random cosmetics, where we find that TV ads influence on the purchasing behavior of women, has conducted research in the field on a sample of women in the University of Baghdad, was a random sample taken from 150 different women in the age and social levels educational and cultural students and employees and teachers in order to sample representative be for the research community, and designed a questionnaire for this purpose form as a tool to collect data and information search and analyzed they answered the sample surveyed using a statistical program (spss) to extract percentages And correlation coefficients and testing square Kay , The study found Of w

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
مجلة كلية التربية للبنات / الجامعة العراقية
مسائل مختارة من ترجيحات الإمام البزازي في الحدود والجنايات من كتاب الفتاوى البزازية / دراسة فقهية مقارنة
...Show More Authors

تضمن البحث التعريف بالإمام البزازي، وحياته العلمية، ومشايخه، وتلامذته، ومؤلفاته، ووفاته، وأربعة مسائل مختارة من ترجيحاته في الحدود والجنايات، والإمام محمد بن محمد بن شهاب بن يوسف (ت827هـ)، يُكنَّى بالكَردَرِيِّ الحنفي الخوارزمي الشهير بالبزَّازي، ويُنسب إلى كَرْدَر، وقد عرض في كتابه كثيرًا من كتب الحنفية، وذكر الكثير من آراء علمائهم مع تعرضه لبعض آراء المذاهب الأخرى. ولم يعتمد على التعريفات اللغوية والاصط

... Show More
View Publication