Preferred Language
Articles
/
jih-1231
One Algorithm to Cipher Messages in Columnar and Fixed Period-d Transposition Cipher
...Show More Authors

    One of ciphering systems depends on transposition of letters in plain text to generate cipher text. The programming of transposition depends mainly on 2-dimension matrix in either methods but the difference is in columnar .We print columns in the matrix according to their numbers in key but in the fixed, the cipher text will be obtained by printing matrix by rows.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Establishment of method and the development of the teaching methods in the late abbissid period and it s impact on the contemporary leading methods
...Show More Authors

Every researcher must say that the world in continually progress toward the best and that
the Arab and Islamic civilization had produced much of systems and virtuous educational
practices which raised from Islamic heritage. This nation was not isolated from external
world, but it was made a clear active for promote the banner of other nations which entered
under her influence to promote Islamic banner and Muslims. Consequently also Muslims are
affected and influenced, this resulted a clear impact in the civilization and educational
ideology especially in the contemporary teaching methods.

View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
LOCAL NEWS SOURCES IN THE IRAQI NEWSPAPERS: Local news sources in the Iraqi newspapers (An analytical study of local news sources In the newspaper Al-Zaman for the period from 1/6/2006 to 06/30/2006)
...Show More Authors

Local news is an important topic of the press because of its importance to readers. It touches their daily life in one way or another, which makes them interested in and followers of them. Hence the importance of local news, as it interests a wide segment of readers.
There are many sources of newspapers for obtaining local news, as these sources are distributed to the newspaper's own sources and external sources.

Self-sources are the newspaper's own sources, through which it is possible to obtain this news, such as the representatives of the newspaper and its correspondents and the journalists working in it. This is the example in this way.
The external sources are distributed to local and international news agencies and sa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Effect of Fire Flame (High Temperature) on the Self Compacted Concrete (SCC) One Way Slabs
...Show More Authors

Experimental work was carried out to investigate the effect of fire flame (high temperature) on specimens of one way slabs using Self Compacted Concrete (SCC). By using furnace manufactured for this purpose, twenty one reinforced concrete slab specimens were exposed to direct fire flame. All of specimens have the same dimensions. The slab specimens were cooled in two types, gradually by left them in the air and suddenly by using water. After that the specimens were tested under two point loads, to study, the effect of
different: temperature levels (300ºC, 500ºC and 700ºC), and cooling rate (gradually and sudden cooling conditions) on the concrete compressive strength, modulus of rupture, flexural strength and the behavior of reinf

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Compression Using Proposed Enhanced Run Length Encoding Algorithm
...Show More Authors

In this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm

View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Engineering And Technology Journal
Improvement of Harris Algorithm Based on Gaussian Scale Space
...Show More Authors

Features is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris corner detection is rotation invariant but it isn’t scale invariant. This paper presents an efficient harris corner detector invariant to scale, this improvement done by using gaussian function with different scales. The experimental results illustrate that it is very useful to use Gaussian linear equation to deal with harris weakness.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
Determination Optimum Inventory Level for Material Using Genetic Algorithm
...Show More Authors

The integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period.             &nb

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Stability of Back Propagation Training Algorithm for Neural Networks
...Show More Authors

In this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained

View Publication Preview PDF
Crossref
Publication Date
Wed Nov 20 2019
Journal Name
Proceedings Of The 2019 3rd International Conference On Big Data Research
Pressure Vessel Design Simulation Using Hybrid Harmony Search Algorithm
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Estimate The Survival Function By Using The Genetic Algorithm
...Show More Authors

  Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref