Preferred Language
Articles
/
jpd-199
The Weighted Index Number Method
...Show More Authors

The process of identifying the region is not an easy process when compared with other operations within the attribute or similarity. It is also not difficult if the process of identifying the region is based on the standard and standard indicators in its calculation. The latter requires the availability of numerical and relative data for the data of each case Any indicator or measure is included in the legal process

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Application of the Canadian Water Quality Index (CCME-WQI) for Aquatic Life to Assess the Effect of Tharthar Water upon the Quality of the Tigris Water, Northern Baghdad City,Iraq
...Show More Authors

The present study aims to assess the effect of the Tharthar Canal as an outlet canal that feeds back from the Tharthar Lake on the quality of the Tigris water. Utilizing a Canadian Water Quality Index (CCME-WQI) for the protection of aquatic life Water samples were obtained every month from January to December of 2020. Six different sites were selected: four along the Tigris River and two on the Tharthar Canal. Seven ecological parameters were used to assess water quality depending on importance and availability: water temperature, Water Temperature, Turbidity, Dissolved Oxygen (DO), Total Dissolved Solids (TDS), pH, Nitrate (NO3-) and Phosphate ( . The study demonstrated that the water quality of the Tharthr canal ranked as a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Preparation of Tin Using Wet Method
...Show More Authors

The preparation of tin metal from stannous chloride solution by wet method in the presence of aluminum powder as a reducing agent is studied. The preparation is commenced through a reduction step in the presence of reducing agent followed by smelting step at elevated temperature in a programmable electrical furnace. In the reduction step, preliminary experiments are conducted to study the effect of initial acidity, time of addition of  the aluminum powder and excess amount of reducing agent on the conversion of stannous to tin metal. Three different parameters are studied through smelting step, these are : heating rate, temperature and residence time.

To characterize the product, different instrumental analyses are used:

... Show More
View Publication
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lossless Data Hiding Using L·SB Method
...Show More Authors

A loS.sless (reversible) data hiding (embedding) method  inside  an image  (translating medium)  - presented   in  the  present  work  using  L_SB (least  significant  bit). technique  which  enables  us to translate   data  using an  image  (host  image),  using  a  secret  key, to  be  undetectable  without losing  any  data  or  without   changing   the  size  and  the  external   scene (visible  properties) of the image, the hid-ing data is then can  be extracted (without  losing)   by reversing &n

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Tue Feb 20 2024
Journal Name
Arab Gulf Journal Of Scientific Research
Investigation of Pseudomonas aeruginosa bacteria in a number of Baghdad schools and extent of their resistance to disinfectants and sterilizers
...Show More Authors

Purpose This study was design to investigate of Purpose This study was design to investigate of P. aeruginosa, an example of Gram-negative bacteria, in seven primary and secondary schools of Baghdad city, and the effects of Ethanol and Dettol of P. aeruginosa biofilm. Design/methodology/approach Seventy swabs were collected from seven primary and secondary schools of Baghdad city, Iraq, during November -December 2022. Swabs were collected from classes desk, doors handles, students hands and water taps. Standard microbiological testing methods were used on the samples for isolation and identification. The ability of bacteria to form biofilm and the effects of Ethanol and Dettol on “preformed” biofilms was examined by microtiter plate wi

... Show More
Scopus (1)
Scopus
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Science And Research
Effects of Pregabalin Drug on Level of Reproductive Hormones, Sexual Activity, Number and Weight of Offspring in Female Albino Rats
...Show More Authors

Abstract: This study was aimed to investigate the effect of two doses of pregabalin (PGB) on hormonal level and sexual activity in female albino rats. Ninety female rats with age (9-10 weeks) and weight (200±20 g) were divided into three major groups of thirty rats. First group was considered as control G1, the second G2 and third G3 groups were exposed to PGB into two doses 150, and 300 mg/kg body weight per day respectively. Each major group was divided into three subgroups (subgroup A, B, and C of each has ten rats), the treatments last for one month for subgroup A, two months for subgroup B, and three months for subgroup C. Five rats from each subgroup were placed separately into two breeding cages with two isolated males and wait

... Show More
Preview PDF