Preferred Language
Articles
/
jih-429
Adaptive Canny Algorithm Using Fast Otsu Multithresholding Method
...Show More Authors

   In this research, an adaptive Canny algorithm using fast Otsu multithresholding method is presented, in which fast Otsu multithresholding method is used to calculate the optimum maximum and minimum hysteresis values and used as automatic thresholding for the fourth stage of the Canny algorithm.      The new adaptive Canny algorithm and the standard Canny algorithm (manual hysteresis value) was tested on standard image (Lena) and satellite image. The results approved the validity and accuracy of the new algorithm to find the images edges for personal and satellite images as pre-step for image segmentation.  
 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluation of direct withholding tax procedures as a tool to increase tax proceeds : applied research in the General Tax Authority / Direct Deduction Department
...Show More Authors

The research aims to evaluate the direct deduction department’s procedures for the process of collecting income tax using the direct deduction method for state departments and the public sector in light of direct deduction tax instructions No. (1) of 2007 and Income Tax Law No. (113) of 1982 (amended) through Giving a clear idea of ​​the reality of tax collection procedures because this type of tax is one of great importance because it contributes to the provision of financial revenues to the state to finance its expenses and direct the economy towards achieving its social, economic and political goals. The researcher makes comparisons between the procedures of the General Tax Authority in collecting the tax and what was approved b

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Simulation Expirment for Proofing the Theoretical Assumption of Time Complexity for Binary Search Tree
...Show More Authors

      It is frequently asserted that an advantage of a binary search tree implementation of a set over linked list implementation is that for reasonably well balanced binary search trees the average search time (to discover whether or not a particular element is present in the set) is O(log N) to the base 2 where N is the number of element in the set (the size of the tree).  This paper presents an experiment for measuring and comparing the obtained binary search tree time with the expected time (theoretical), this experiment proved the correctness of the hypothesis, the experiment is carried out using a program in turbo Pascal with recursion technique implementation and a statistical method  to prove th

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Energy Methods For Initial –Boundary String Problem
...Show More Authors

  We study one example of hyperbolic problems it's Initial-boundary string problem with two ends. In fact we look for the solution in weak sense in some sobolev spaces. Also we use energy technic with Galerkin's method to study some properties for our problem as existence and uniqueness

View Publication Preview PDF
Publication Date
Mon Dec 28 2020
Journal Name
Journal Of The College Of Education For Women
The Effectiveness of Instructional Scaffolding Strategy in the Development of Academic Achievement and Critical Thinking in Female Second Year Secondary Students in Mathematics: محمد بن صنت الحربي , آمنة بنت سعيد بن جبل
...Show More Authors

This study aims to find out the effectiveness of instructional scaffolding strategy in the development of academic achievement and critical thinking of female second grade secondary mathematics students. Semi-experimental and relational descriptive method was used. The sample of the study consisted of (50) students divided into an experimental group and a control group. The experimental group was taught using scaffolding strategy whereas the control group was taught using traditional method. Pre- and Post-tests were used to achieve the objective of the study. The results of the study revealed that there are statistically significant differences in the mean scores of the experimental and control groups in the posttest for both the academi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Exact Solution for Systems of Nonlinear (2+1)D-Differential Equations
...Show More Authors

      The aim of this article is to present the exact analytical solution for models as system of (2+1) dimensional PDEs by using a reliable manner based on combined LA-transform with decomposition technique and the results have shown a high-precision, smooth and speed convergence to the exact solution compared with other classic methods. The suggested approach does not need any discretization of the domain or presents assumptions or neglect for a small parameter in the problem and does not need to convert the nonlinear terms into linear ones. The convergence of series solution has been shown with two illustrated examples such (2+1)D- Burger's system and (2+1)D- Boiti-Leon-Pempinelli (BLP) system.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Journal Of Science
On y-closed Dual Rickart Modules
...Show More Authors

In this paper, we develop the work of Ghawi on close dual Rickart modules and discuss y-closed dual Rickart modules with some properties. Then, we prove that, if are y-closed simple -modues and if -y-closed is a dual Rickart module, then either Hom ( ) =0 or . Also, we study the direct sum of y-closed dual Rickart modules.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Linear Feedback Shift Registers-Based Randomization for Image Steganography
...Show More Authors

     Steganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Engineering
Design of New Hybrid Neural Controller for Nonlinear CSTR System based on Identification
...Show More Authors

This paper proposes improving the structure of the neural controller based on the identification model for nonlinear systems. The goal of this work is to employ the structure of the Modified Elman Neural Network (MENN) model into the NARMA-L2 structure instead of Multi-Layer Perceptron (MLP) model in order to construct a new hybrid neural structure that can be used as an identifier model and a nonlinear controller for the SISO linear or nonlinear systems. Two learning algorithms are used to adjust the parameters weight of the hybrid neural structure with its serial-parallel configuration; the first one is supervised learning algorithm based Back Propagation Algorithm (BPA) and the second one is an intelligent algorithm n

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Mar 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Synergistic Effect of Potassium Iodide on Inhibitive Performance of Propyl Alcohol during Corrosion of Mild Steel in 1.0M HCl
...Show More Authors

   The inhibition of mild steel corrosion in 1.0M HCl by 1-propanol and the synergistic effect of potassium iodide (KI) was investigated using weight loss and polarization techniques in the temperature range (30 ‒ 50) ̊ C. A matrix of Doelhert to three factors was used as the experimental design, adopting weight loss results as it permits the use of the response surface methodology which exploited in determination of the synergistic effect as inhibition on the mild steel. The results were confirmed using electrochemical polarization measurements. Experimental results showed that the inhibition efficiency (IE%) increases with increase in concentration of inhibitor and with increasing of temperature. The addition iodide ions t

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Antimicrobial and Antibiofilm Activity of Mango Seeds Extract
...Show More Authors

Mango fruit is one of the most nutritionally rich fruits with unique flavor, this fruit belonged to family of Anacardiaceae and it is an excellent source of vitamins specially vitamin A, carotene pigments and potassium. In this study the antimicrobial activity of mango seeds extract has been investigated against gram positive bacteria (Staphylococcus aureus and Bacillus spp.) and gram negative bacteria (Pseudomonas aeruginosa and E. coli) and yeast Candida albicans by well diffusion method in nutrient agar and the results were expressed as the diameter of bacterial inhibition zones surrounding the wells, and the antibiofilm of its extracts was observed against Staphylococcus aureus. The seeds extractions prepared by two solvents: 85% eth

... Show More
View Publication Preview PDF