Preferred Language
Articles
/
jhfnNY8BVTCNdQwCk2K8
A General Overview on the Categories of Image Features Extraction Techniques: A Survey
...Show More Authors

In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 15 2020
Journal Name
International Journal Of Energy Research
Effect of airflow channel arrangement on the discharge of a composite metal foam‐phase change material heat exchanger
...Show More Authors

View Publication
Scopus (41)
Crossref (36)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Engineering
The effect of titanium oxide microparticles on mechanical properties, absorption and solubility processes of a glass ionomer cement
...Show More Authors

Glass Ionomer Cement (GIC) is one of the important dental temporary filing materials. The aim of this study is to evaluate the effect of adding 3, 5 and 7 wt. % of TiO2 microparticles to conventional GIC powder (Riva Self Cure) on mechanical properties and its effect on absorption and solubility processes. TiO2 particles additives improved compressive strength and biaxial flexural strength, where the compressive strength increased with increasing in the added ratio, while the highest value of the biaxial flexural strength was at 3 wt.%. The addition of TiO2 particles improved the surface Vickers microhardness values, with highest value at 5 wt. %. On other hand TiO2 addition im

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Education Reform: A Strategy for a School of Success
...Show More Authors

Since independence in 1956, several attempts have been made to reform educational practices in the Moroccan education system, while going through several stages:Evaluation of the state of the Moroccan education system, determination of failures and the establishment of an effective strategy to improve the quality of education and training in the Moroccan public school.We focus on monitoring the establishment of the pillars of the reform, against the various difficulties that hinder the development of the education sector, from 1999 until today and towards the horizon of 2030. We provide data on the situation of the reform, then we analyze its various stages from a critical point of view, based on the reports of the court of auditors, to

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Sep 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Modeling of a Sulfonation Reactor in a Detergent Factory
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Al–bahith Al–a'alami
University Youth Attitudes towards Electronic Advertisements and their Relationship to the Behavior of the Consumer A Field Study of a Sample of Students of the College of Mass-Communication / University of Baghdad as a Model
...Show More Authors

This research aims at identifying the communicative habits and content reflections on the communication process, especially the young audience which is one of the main group for whom the announcements are made. Because young people face life with passion and aspiration making them respond to each effect used by the media in the design of the advertising using all the effective techniques, attractive methods for young children like depending on drama, technical tricks, music and logos easily to be remembered and responded to the desires of the young in their entertainment. This research also aims at identifying the impact of the internet as a channel of commercial advertising on the purchasing behavior of young people at the universities

... Show More
View Publication
Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
A Sociocultural Perspective on Iraqi EFL Learners Reading Comprehension Development
...Show More Authors

 Improving speaking skills of Iraqi EFL students was the main purpose of the current research. Thirty EFL students were selected as the research participants for achieving this aim. All students completed the pretest and then spent the next 25 weeks meeting for 90 minutes each to present their nine lectures, answer difficult questions, and get feedback on their use of language in context. Progressive-tests, posttests and delayed post-tests followed every three courses. The researcher utilized SPSS 22 to anal Analyze the data descriptively and inferentially after doing an ANOVA on repeated measurements. It has been shown that using the ideas of sociocultural theory in the classroom has an important and positive impact on students of

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 28 2020
Journal Name
Iraqi Journal Of Science
A Study on n-Derivation in Prime Near – Rings
...Show More Authors

The main purpose of this paper is to show that zero symmetric prime near-rings, satisfying certain identities on n-derivations, are commutative rings.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
A Study on Cosmetic Products Marketed in Iraq: Microbiological Aspect
...Show More Authors

Cosmetic products contain variable amounts of nutrients that support microbial growth. Most contaminants   in   cosmetic   products   include bacteria such as Staphylococcus, Pseudomonas, Klebsiella,   Achromobacter   and   Alcaligenes. Contaminated water  is  a  likely  source  of organisms found in cosmetic products. Products such as shampoo, hand and body lotion, facial cleanser,  and liquid soaps were analyzed. In this study, out of 60 cosmetic products analyzed, 26.4% were found to be contaminated.    Most of the contamination was from bacteria and no fungal contamination was detected.  The highest level o

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Journal Of Science
A study on Soft Pre-Open Sets using γ Operation
...Show More Authors

The concept of strong soft  pre-open set was initiated by Biswas and Parsanann.We utilize this notion to study several characterizations and properties of this set. We investigate the relationships between this set and other types of soft open sets. Moreover, the properties of the strong soft  pre-interior and closure are discussed. Furthermore, we define a new concept by using strong soft  pre-closed that we denote as locally strong soft  pre-closed, in which several results are obtained. We establish a new type of soft pre-open set, namely soft  pre-open. Also, we continue to study pre-  soft open set and discuss the relationships among all these sets. Some counter examples are given to show some relations

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref