Preferred Language
Articles
/
jih-541
Repeated Corrected Simpson's 3/8 Quadrature Method for Solving Fredholm Linear Integral Equations of the Second Kind
...Show More Authors

  In this paper, we use the repeated corrected Simpson's 3/8 quadrature method for obtaining the numerical solutions of Fredholm linear integral equations of the second kind. This method is more accurately than the repeated corrected Trapezoidal method and the repeated Simpson's 3/8 method. To illustrate the accuracy of this method, we give a numerical example

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lossless Data Hiding Using L·SB Method
...Show More Authors

A loS.sless (reversible) data hiding (embedding) method  inside  an image  (translating medium)  - presented   in  the  present  work  using  L_SB (least  significant  bit). technique  which  enables  us to translate   data  using an  image  (host  image),  using  a  secret  key, to  be  undetectable  without losing  any  data  or  without   changing   the  size  and  the  external   scene (visible  properties) of the image, the hid-ing data is then can  be extracted (without  losing)   by reversing &n

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More
Publication Date
Tue Mar 01 2022
Journal Name
Experimental Parasitology
The association of IL-3, IL-17A, and IL 27 serum levels with susceptibility to toxoplasmosis in recurrent abortion of Iraqi women
...Show More Authors

Cytokines are a group of immunomodulatory proteins leading to a variety of immune reactions in the human; these cytokines play a significant role in the development of appropriate immune responses against T. gondii. This study aims to reveal the association of toxoplasmosis with serum levels of IL-3, IL-17A, and IL-27 in aborted women. The blood samples of patients and controls were collected from Al-Alawiya Maternity Teaching Hospital/Baghdad/Iraq from 2019 to 2020 for detecting anti-T. gondii antibodies (IgG and IgM) and the level of interleukins by ELISA. The results of TORCH by rapid test for recurrent abortion recorded 25.3% seropositive for anti-Toxoplasma antibodies, and 31.5% seropositive for one or more cases of TORCH test (Cytomeg

... Show More
View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Apr 05 2024
Journal Name
International Journal Of Science And Research (ijsr)
Effect of Body Mass Index on Eruption Time of Permanent First Molars and Incisors among a Group of 6- 8 Year Old Iraqi School Children
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Materials Research Bulletin
Understanding the impacts of Al+3-substitutions on the enhancement of magnetic, dielectric and electrical behaviors of ceramic processed nickel-zinc mixed ferrites: FTIR assisted studies
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Sun May 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Maximum Complete (k,n)-Arcs in the Projective Plane PG(2,4) By Geometric Method
...Show More Authors

A (k,n)-arc A in a finite projective plane PG(2,q) over Galois field GF(q), q=pⁿ for same prime number p and some integer n≥2, is a set of k points, no n+1 of which are collinear.  A (k,n)-arc is complete if it is not contained in a(k+1,n)-arc.  In this paper, the maximum complete (k,n)-arcs, n=2,3 in PG(2,4) can be constructed from the equation of the conic.

View Publication Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Synthesis and Characterization of New Heterocyclic Compounds from 2, 5- dimercapto -1, 3, 4-Thiadiazole and Their Resins
...Show More Authors

In this research, a new 1, 3, 4-Thiadiazole derivatives have been synthesized by many heterocyclic reactions. Starting from (2, 5 – dimercapto -1, 3, 4-Thiadiazole) a variety of derivatives have been synthesis. Compound (1) was synthesized by the reaction of hydrazine hydrate with carbon disulphide in absolute ethanol. The compound (1) was reacted with 1, 2-dibromoethane in presence of alkali ethanol to give the compound (2). The compound (3) was formed from the reaction of compound (2) with hydrazine hydrate. Schiff base (4) was obtained by reacting of compound (3) with the compound (p-hydroxybenzaldehyde) in absolute ethanol. A variety of phenolic Schiff base (Methylolic, Etheric, and Epoxy) derivatives have been synthesized. Methylol

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Adaptive Canny Algorithm Using Fast Otsu Multithresholding Method
...Show More Authors

   In this research, an adaptive Canny algorithm using fast Otsu multithresholding method is presented, in which fast Otsu multithresholding method is used to calculate the optimum maximum and minimum hysteresis values and used as automatic thresholding for the fourth stage of the Canny algorithm.      The new adaptive Canny algorithm and the standard Canny algorithm (manual hysteresis value) was tested on standard image (Lena) and satellite image. The results approved the validity and accuracy of the new algorithm to find the images edges for personal and satellite images as pre-step for image segmentation.  
 

View Publication Preview PDF