Preferred Language
Articles
/
joe-3022
Image Reconstruction Using Modified Hybrid Transform
...Show More Authors

In this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 24 2022
Journal Name
Journal Of Experimental Botany
Molecular basis of differential adventitious rooting competence in poplar genotypes
...Show More Authors

Recalcitrant adventitious root (AR) development is a major hurdle in propagating commercially important woody plants. Although significant progress has been made to identify genes involved in subsequent steps of AR development, the molecular basis of differences in apparent recalcitrance to form AR between easy-to-root and difficult-to-root genotypes remains unknown. To address this, we generated cambium tissue-specific transcriptomic data from stem cuttings of hybrid aspen, T89 (difficult-to-root) and hybrid poplar OP42 (easy-to-root), and used transgenic approaches to verify the role of several transcription factors in the control of adventitious rooting. Increased peroxidase activity was positively correlated with better rooting. We foun

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Tue Mar 19 2024
Journal Name
Jordan Journal Of Pharmaceutical Sciences
MMP-1 and MMP-7 Expression is Influenced by Ginsenosides in Mice Exposed to Aflatoxin B1: in vivo Study
...Show More Authors

Panax ginseng (PG), one of the most widely used herbal medicines, has demonstrated various beneficial effects such as anti-inflammatory, antioxidant, and anticancer impacts. Naturally occurring ginsenosides in the ginseng plant inhibit cell proliferation and significantly reduce liver damage induced by certain chemicals. Aflatoxin B1 (AFB1) is a primary mycotoxin due to its hepatotoxic, immunotoxic, and oncogenic effects in animal models and humans. In this study, we examined the effects of assorted doses of PG aqueous crude extract on the expression of matrix metalloproteinase 1 and 7 (MMP-1 and MMP-7) in the kidney, spleen, and liver of experimental AFB1-exposed mice, using immunohistochemistry (IHC). Mice were orally administered

... Show More
View Publication
Scopus (11)
Crossref (2)
Scopus Crossref
Publication Date
Mon Feb 10 2025
Journal Name
Journal Of Optics
Implementing quantum key distribution based on coincidence detection captured from two different single photon detection modules
...Show More Authors

Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Application of Wavelet Packet and S Transforms for Differential Protection of Power Transformer
...Show More Authors

The differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Al-dhad - Book Store And Publishing
Multivariate Analysis (First Edition)
...Show More Authors

This Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters. Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. Many solved examples are intended in this book, in addition to a variety of unsolved relied pro

... Show More
Publication Date
Sun Sep 01 2019
Journal Name
Al-dhad Book Store
Multivariate Analysis - First Edition
...Show More Authors

This Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters. Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. Many solved examples are intended in this book, in addition to a variety of unsolved relied pro

... Show More
Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Face mask detection methods and techniques: A review
...Show More Authors

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m

... Show More
View Publication
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Magic square
...Show More Authors

In this paper we introduce two Algorithms, the first Algorithms when it is odd order and how we calculate magic square and rotation for it. The second Algorithms when it be even order and how to find magic square and rotation for it.

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Journal Of Dentistry
In-vitro adhesive and interfacial analysis of a phosphorylated resin polyalkenoate cement bonded to dental hard tissues.
...Show More Authors

Objectives: To assess the performance of a novel resin-modified glass-ionomer cement (pRMGIC) bonded to various tooth tissues after two-time intervals. Methods: 192 sound human molars were randomly assigned to 3 groups (n = 64): sound enamel, demineralised enamel, sound dentine. Sixty-four teeth with natural carious lesions including caries-affected dentine (CAD) were selected. All substrates were prepared, conditioned and restored with pRMGIC (30% ethylene glycol methacrylate phosphate (EGMP, experimental), Fuji II LC (control), Fuji IX, and Filtek™ Supreme with Scotchbond ™ Universal Adhesive. Shear bond strength (SBS) was determined after 24 h and three months storage in SBF at 37C. The debonded surfaces were examined using stereomi

... Show More
View Publication
Scopus (10)
Crossref (11)
Scopus Clarivate Crossref