Preferred Language
Articles
/
jeasiq-1377
PART 3 New Experiments Three Factors On The Box plot, Box notch & Outlier Values
...Show More Authors

New two experiments of the three factors, in this study were constructed to investigate the effects, of the fixed variations to the box plot on subjects' judgments of the box lengths. These two experiments were constructed as an extension to the group B experiments, the ratio experiments the experiments with two variables carried out previously by Hussin, M.M. (1989, 2006, 2007). The first experiment box notch experiment, and the second experiment outlier values experiment. Subjects were asked to judge what percentage the shorter represented of the longer length in pairs of box lengths and give an estimate of percentage, one being a standard plot and the other being of a different box lengths and also varying with respect to other elements such as, box width & box notch or box width & outlier values. When Hussin, M.M. (1989) suggested in the future research points (1, 2, 3), can take account of wider range of the variables levels and the changing length of the standard box plot effects on the subjects' perception of the box length and further investigations could be made into variations such as box notch with box length; box notch with box length; whisker length, and also outlier values with these variations. However, both experiments were used the stander box length as the middle box length levels were not used in the experiments. The results of these two experiments suggest that these variations effected the subjects' perception of box length, as a results of the interactions between box plot features by creating visual illusions as which effect the subjects ability to accurately judge box length, both experiments were run in statistics department, Baghdad University.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Solving Hyperbolic Trajectory Using New Predictor-Corrector Quadrature Algorithms
...Show More Authors

In this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 19 2025
Journal Name
Basra Studies Journal
Impact of Digital Sociology on Land Usage in New Cities
...Show More Authors

View Publication
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 14 2014
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci
Synthesis and Characterization of Some O-[2-{''2-Substituted Aryl (''1,''3,''4 thiadiazolyl) ['3,'4-b]-'1,'2,'4- Triazolyl]-Ethyl]-p- chlorobenzald oxime Derivatives
...Show More Authors

In this study new derivatives of O-[2-{''2-Substituted Aryl (''1,''3,''4 thiadiazolyl) ['3,'4-b]-'1,'2,'4- Triazolyl]-Ethyl]-p- chlorobenzald oxime (6-11)have been synthesized from the starting material p-chloro – E- benzaldoxime 1.Compound 2 was synthesized by the reaction of p-chloro – E- benzaldoxime with ethyl acrylate in basic medium. Refluxing compound 2 with hydrazine hydrate in ethanol absolute afforded 3. Derivative 4 was prepared by the reaction of 3 with carbon disulphide, treated of compound 4 with hydrazine hydrate gave 5. The derivatives (6-11) were prepared by the reaction of 5 with different substitutesof aromatic acids. The structures of these compounds were characterized from their melting points, infrared spectroscopy

... Show More
Publication Date
Fri Jan 01 2010
Journal Name
Journal Of The College Of Education, Al-mustansiriya University
Synthesis and ldentification of metal complexes of 1- phenyl -3, (2'(S'phenyl amine)'l, 3, 4-thiad iazole'Z'yl) phenyl thiourea.
...Show More Authors

Complexes of 1-phenyl-3-(2(-5-(phenyl amino)-1,3,4- thiadiazole-2-yl)phenyl) thiourea have been prepared and characteized by elemental analysis, Ff-[R, and u.v./ visible spectra moreover, determination of metal content M%o by flame atomic absorption spectroscopy, molar conductance in DMSO solution and magnetic moments (peffl. The result showed that the ligand (L) was coordinated to Mn*2, Ni*2, Ct*2,2n*2,Cd*2, and Hg*2 ions through the nitrogen atoms and sulpher atoms. From the result obtained, rhe following general formula [MLClz] has been given for the prepared complexes with an octahedral geometry around the metal ions for all complexes. where M= Mn*2, Ni*2, cu*2, zn*z, cd*z, and Hg*2 l= l-phenyl-3-(2-(5-(phenyl amino)-1, 3,

... Show More
Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Dyes And Pigments
3′,3′,4′,4′,5′,5′,6′,6′,6′-nonafluoro-hexyloxy groups substituted phthalocyanines: Synthesis, characterization and their biological properties
...Show More Authors

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Nov 06 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Determination of Contributing Risk Factors to Adult Nephrolithiasis Patients
...Show More Authors

Objectives: To determine the contributing risk factors to adult nephrolithiasis patients.
Methodology: A descriptive study was conducted to determine the contributing risk factors to
Adults nephrolithiasis starting from December 2007 to September 2008. A purposive "nonprobability"
sample of (100) patients with nephrolithiasis was selected of those who were
admitted to the hospitals, attending the Urology Consultation Clinic and Extracorporeal Shock
Wave Lithotripsy Department. The study instrument consists of two parts. The first part is
related to the patients' demographic variables and the second part is constructed to serve the
purpose of the study. The total number of items in the questionnaire was (85) ones.

... Show More
View Publication Preview PDF