Preferred Language
Articles
/
jih-1390
Construction and Study of Amine Electrodes Based on Membranes Containing Sulfonic Compounds as Active Materials with Different Plasticizers in PVC Matrix Membranes
...Show More Authors

Several  amine  liquid selective  electrodes  were prepared based on

two  active   materials,   phenol  sulfonic   acid  and   l ,2-dihydroxy-3,5- disulfonic  acid   disodium   salt   with  several   plasticizers,  di-n-butyl phthalate(ORPH),  tri-n-butyl   phosphate   (TBP)   and  a-nitro   phenyl octyl  ether   (NPOE).   Electrode   parameters   were  studied   including, concentration range,  detection  limit,  slope,  life  time,  response  time and  pH  effect.  Excellent   results  were  obtained   based  on  n-hyptyl

methyl  amine   with  DBPH  and  phenol  sulfonic   acid  as  an active

material.  The  slope  was  56.g  mY/decade,  concentration range  was ranged from  1o·' M to 1o-4  M with correlation coefficient  of 0.9999, detection  limit of 6 x l o-) M and pH ranged from 5.6 to less than one.

Electrode  based on tri-hutyl amine as a secondary  amine gives a slope

48.4 mV/decade   with  good  results  for  the other  parameters, but for dccyl amine  as a  primary  runine give very poor response. Electrodes based  on  secondary   and  tertiat)'  amines  gives  very  poor  response because incompatibility of NOPE  with active  material  and pvc. Also the study  was carried  out for a second  active  material  1,2-dihydroxy-

3,5-disulfonic  acid   disodium   salt   and   also   a  good   results   were obtained.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 11 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluating Health-Related Quality of Life (HRQoL) in Iraqi Adult and Pediatric Patients with Beta-Thalassemia Major Using Two Different Iron Chelation Therapies
...Show More Authors

 

 

View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modeling Dynamic Background based on Linear Equation
...Show More Authors

     Detection moving car in front view is difficult operation because of the dynamic background due to the movement of moving car and the complex environment that surround the car, to solve that, this paper proposed new method based on linear equation to determine the region of interest by building more effective background model to deal with dynamic background scenes. This method exploited the permitted region between cars according to traffic law to determine the region (road) that in front the moving car which the moving cars move on. The experimental results show that the proposed method can define the region that represents the lane in front of moving car successfully with precision over 94%and detection rate 86

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Steganography Method Based on DCT Coefficients
...Show More Authors

      In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor

... Show More
Publication Date
Sun Jun 29 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Multimedia Tools And Applications
Shot boundary detection based on orthogonal polynomial
...Show More Authors

View Publication
Scopus (41)
Crossref (35)
Scopus Clarivate Crossref