Preferred Language
Articles
/
jih-1835
Robust Watermarking Scheme for GIS Vector Maps
...Show More Authors

  With the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming  the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data. The digital map is separated into the isolated parts.Watermark data are embedded within the nominated magnitudes in each part when satisfied the definite criteria. The efficiency of proposed watermarking scheme is assessed within statistical measures based on two factors which are fidelity and robustness. Experimental results demonstrate the proposed watermarking scheme representing ideal trade off for disagreement issue between distortion amount and robustness. Also, the proposed scheme shows  robust resistance for many kinds of attacks.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 25 2018
Journal Name
Al–bahith Al–a'alami
Competencies of the Curriculum of Digital Media Education from the Perspective of Iraqi University Professors:
...Show More Authors

he research aims to determine the competencies that must be met in the digital media literacy curriculum, which contributes to a great extent in developing the skills of criticism and analysis of the media contents of the students. The study of the two researchers according to the methodology of the media survey. The research tools were: the questionnaire tool, which distributed on 86 . The main objectives of the research were:
1. Knowing the best strategy in teaching the digital media literacy curriculum.
2. Knowing which education fits the digital media literacy curriculum.
3. Identifying the cognitive, educational, media, technical skills, and emotional competencies required for the digital media literacy curriculum from the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Coating of Carbon Nanotubes Using Chemical Method to Enhance the Corrosion Protection of Copper and Aluminum Metals in Seawater Medium
...Show More Authors

     In this study, carbon nanotubes were prepared using a pure chemical method modified similar to the Hummers method with simple changes in the work steps. The carbon nanotubes were then coated and reduced on copper and aluminum metals using the electrodeposition method (EDP) for corrosion protection application in seawater medium (NaCl 3.5%) at four different temperatures: 20, 30, 40, and 50 °C, which were studied using three electrode potentiostats. All corrosion measurements, thermodynamics, and kinetics parameters were nominated from Tafel plots. The films deposited by the carbon nanotubes were examined by the SEM technique, and this technique showed the formation of carbon nanotubes.

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Oct 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study the Efficiency of Poly Nicotine Amide as Anticorrosion Coating on Stainless Steel and Study Its Biological Activity
...Show More Authors

Using an electrochemical polymerization technique at room temperature, poly nicotine amide (PNA) was produced from the monomer nicotine amide (NA) in aqueous solution. The structure of polymer layer generated on the stainless steel surface (316 L) (working electrode) is investigated by Fourier Transmission Infrared Region (FT-IR). The anti-corrosion activity of polymer coating on the stainless steel (SS 316 L) is investigated by electrochemical polarization in 0.20M solution of HCl at 293-323K. The graphene -modified polymer film-coated SS had greater protection efficiency (PE percent) when compared to Nano ZnO -modified polymer film-coated SS. For the corrosion process of SS 316 L, kinetic and thermo-dynamic parameters of activation are

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Feb 13 2025
Journal Name
Iraoi Journal Of Statistical Sciences
حول تقليص تقدير المركبات الرئيسة مع التطبيق
...Show More Authors

This research deals with a shrinking method concerned with the principal components similar to that one which used in the multiple regression “Least Absolute Shrinkage and Selection: LASS”. The goal here is to make an uncorrelated linear combinations from only a subset of explanatory variables that may have a multicollinearity problem instead taking the whole number say, (K) of them. This shrinkage will force some coefficients to equal zero, after making some restriction on them by some "tuning parameter" say, (t) which balances the bias and variance amount from side, and doesn't exceed the acceptable percent explained variance of these components. This had been shown by MSE criterion in the regression case and the percent explained

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 29 2013
Journal Name
Journal Of Statistics Applications & Probability
Analyzing Skewed Data with the Epsilon Skew Gamma distribution
...Show More Authors

A new distribution, the Epsilon Skew Gamma (ESΓ ) distribution, which was first introduced by Abdulah [1], is used on a near Gamma data. We first redefine the ESΓ distribution, its properties, and characteristics, and then we estimate its parameters using the maximum likelihood and moment estimators. We finally use these estimators to fit the data with the ESΓ distribution

Crossref (5)
Crossref
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
Analytical Study of climate changes effect on wind speed in Al- Nasiriya, Iraq
...Show More Authors

     The ambient temperature is the major parameter that influences wind speed. When temperature rises, air will be extended and wind will flow with different speeds in all directions, increasing of temperature means that wind speed will be increased and vice versa. The relative humidity and atmospheric pressure affected with temperature, too. Climate changes making significant effects on the atmospheric temperature. In this project, the data of thirty four years (1981 – 2004) has been analyzed to get an idea about the changes occurred in the meteorological parameters in Al-Nasiriya city, which was chosen because it has a distinctive wind speed.

View Publication Preview PDF
Publication Date
Tue Jan 03 2023
Journal Name
College Of Islamic Sciences
Ruling on selling big data (Authentical Fiqh Study): Ruling on selling big data (Authentical Fiqh Study)
...Show More Authors

Abstract:

Research Topic: Ruling on the sale of big data

Its objectives: a statement of what it is, importance, source and governance.

The methodology of the curriculum is inductive, comparative and critical

One of the most important results: it is not permissible to attack it and it is a valuable money, and it is permissible to sell big data as long as it does not contain data to users who are not satisfied with selling it

 Recommendation: Follow-up of studies dealing with the provisions of the issue

Subject Terms

Judgment, Sale, Data, Mega, Sayings, Jurists

 

View Publication Preview PDF
Publication Date
Tue Mar 03 2009
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of repetitive estimation methodsSelf-data
...Show More Authors

In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation)  structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of  these procedures and compare them using generated data.

View Publication Preview PDF
Crossref
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Data visualization and distinct features extraction of the comet Ison 2013
...Show More Authors

The distribution of the intensity of the comet Ison C/2013 is studied by taking its histogram. This distribution reveals four distinct regions that related to the background, tail, coma and nucleus. One dimensional temperature distribution fitting is achieved by using two mathematical equations that related to the coordinate of the center of the comet. The quiver plot of the gradient of the comet shows very clearly that arrows headed towards the maximum intensity of the comet.

View Publication Preview PDF
Crossref