Preferred Language
Articles
/
joe-367
Stator Faults Diagnosis and Protection in 3-Phase Induction Motor Based on Wavelet Theory
...Show More Authors

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 21 2025
Journal Name
Journal Of Physical Education
The Contribution of Ball Launching and Ring Entrance Angle Variables in 3 points Jump Shot in Basketball
...Show More Authors

The research aimed at identifying the values of ball launch and ring entrance angle and relations among them as well as identifying the contribution of ball launch and angle variables in 3 point jump in basketball. The researchers hypothesized statistical relation between ball launch and entrance angle. They used the descriptive method on (10) basketball players best known for their 3 point jump shot. Each player is given (10) attempts and only attempts with a larger entrance angle in recorded. The results showed that the height of ball launch players an integral role in decreasing entrance angle as well as ball launch angle did not correlate with the entrance angle. Finally, ball launch variables have no effect or contribution on ball entr

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Agricultural Engineering
Comparing Nozzles with Different Wear Rate and Working with the Same Application Rate of Different Plant Protection Products in Aspect of Plants Condition
...Show More Authors
Abstract<p>Three different types of nozzles (different wear rate) were used in this study. They are classified depending on the severity of their wear to three groups: new, worn and damaged nozzles. Those nozzles were spraying with the same application rate (303 l/ha) on two-year field trials; this was achieved by changing the spraying pressure for each group of nozzles in order to get the same application rate. This practice is usually done by operators of sprayers, who calibrate the sprayers on the same application rate every year without changing the nozzles, so they tend to reduce the spraying pressure in order to compensate the flow rate increase due to the nozzles yearly wear. Two types of</p> ... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Jul 15 2021
Journal Name
University Of Samarra
Preparation, Diagnosis and Biological ‎Efficacy of new Ligands Derived from ‎Succinyl Chloride and Their Metal ‎Complexes and non metallic
...Show More Authors

The purpose of my thesis is to synthesis two new bidentate ligands ‎which were used to prepare series of metal complexes by reacting the ‎ligands with (M+2 = Mn, Co, Ni, Cu, Cd and Hg) ‎ ‎ Succinyl chloride was used as starting material to synthesis two ‎bidentate ligands (L1) and (L2) by reaction it with 4-chloroaniline ‎‎(L1) and ‎ ‎ (4-aminoacetophenone) (L2) in dichloromethane as a solvent, that ‎are:‎ ‎(L1) = N1,N4-bis (4-chloro phenyl ) succinamide ‎(L2) =N1,N4-bis(4-acetylphenyl)succinamide ‎ The new ligands were characterize by using spectroscopic study ‎‎(Fourier-transform infrared spectroscopy (FT-IR), electronic spectra ( ‎UV-Vis) ,nuclear magnetic resonance(1H,13C-NMR), Mass spectra ‎

... Show More
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design Active Filter Based on Genetic Algorithm
...Show More Authors

The  lossy-FDNR  based  aclive  fil ter has an  important   property among  many  design  realizations. 'This includes  a significant reduction in component count particularly in the number  of OP-AMP which consumes   power.  However  the·  problem  of  this   type  is the  large component spreads  which affect the fdter performance.

In  this  paper   Genetic   Algorithm   is  applied   to  minimize   the component  spread   (capacitance  and  resistance  p,read). The minimization of these spreads allow the fil

... Show More
View Publication Preview PDF
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modeling Dynamic Background based on Linear Equation
...Show More Authors

     Detection moving car in front view is difficult operation because of the dynamic background due to the movement of moving car and the complex environment that surround the car, to solve that, this paper proposed new method based on linear equation to determine the region of interest by building more effective background model to deal with dynamic background scenes. This method exploited the permitted region between cars according to traffic law to determine the region (road) that in front the moving car which the moving cars move on. The experimental results show that the proposed method can define the region that represents the lane in front of moving car successfully with precision over 94%and detection rate 86

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Steganography Method Based on DCT Coefficients
...Show More Authors

      In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor

... Show More
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More