Preferred Language
Articles
/
oxeGNY8BVTCNdQwCnGF3
Fast Handoff Scheme for Cluster-Based Proxy Mobile IPv6 Protocol
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Dec 18 2021
Journal Name
Egyptian Journal Of Chemistry
Coumarin based-histone deactylace HADC inhibitors
...Show More Authors

Coumarins have been recognized as anticancer competitors. HDACis are one of the interesting issues in the field of antitumor research. In order to achieve an increased anticancer efficacy, a series of hybrid compounds bearing coumarin scaffolds have been designed and synthesized as novel HDACis, In this review we present a series of novel HDAC inhibitors comprising coumarin as a core e of cap group of HDAC inhibitors that have been designed, synthesized and assessed for their enzyme inhibitory activity as well as antiproliferative activity. Most of them exhibited potent HDAC inhibitory activity and significant cytotoxicity

View Publication
Scopus (1)
Scopus
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

     Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd  level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Signature Verification Based on Moments Technique
...Show More Authors

In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (10)
Crossref (5)
Scopus Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Journal Of Engineering
Knowledge-Based Urban Development The Impact of Knowledge- Based Urban Development in the Growth of Contemporary Cities
...Show More Authors

Urban Development refers to many topics such as: increased population density, city size, and individual’s production, distribution of technology and the growth of commercial, industrial and service professions. Such development is linked to the coordination of social and cultural trends in order to achieve social progress and economical prosperity. Knowledge as a topic now is known as intellectual capital wich led to upgrae the concept of urban development to be extended into many fields of knowledge, for example, cultural, social and human development to move the level of community culture into a new better standard.

The research adopted the urban transformation based on knowledge as an important factor in gr

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
The impact of the communication system on some organizational adjustment options Aimed at addressing the digital divide Analysis of opinions of managers in Iraqi mobile phone companies
...Show More Authors

This research began by explaining its variables and dimensions especially the digital gap, which the authors explained it elaborately beginning with the concept, the reasons blind its emergence of its measurement, and how to treat it. The authors supposed the potentiality of relying on enforcing knowledge in general and the groups suffer from this gap in particular, especially the targeted knowledge to treat its subject.

As enforcing knowledge usually depends on some strategies or choices of organizational orientation among them is learning and training from one side, and communication, as an indicating factor for organizational effectiveness as the authors refer from the other side.

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Procedia Economics And Finance
The Mediating Role of Knowledge Sharing on Relationship between IT Capability and IT Support as Predictors of Innovation Performance: An Empirical Study on Mobile Companies in Iraq
...Show More Authors

View Publication Preview PDF
Crossref (18)
Clarivate Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Tikrit Journal For Dental Sciences
Microleakage Evaluation of a Silorane-Based and Methacrylate-Based Packable and Nanofill Posterior Composites (in vitro comparative study)
...Show More Authors

This study compared in vitro the microleakage of a new low shrink silorane-based posterior composite (Filtek™ P90) and two methacrylate-based composites: a packable posterior composite (Filtek™ P60) and a nanofill composite (Filtek™ Supreme XT) through dye penetration test. Thirty sound human upper premolars were used in this study. Standardized class V cavities were prepared at the buccal surface of each tooth. The teeth were then divided into three groups of ten teeth each: (Group 1: restored with Filtek™ P90, Group 2: restored with Filtek™ P60, and Group 3: restored with Filtek™ Supreme XT). Each composite system was used according to the manufacturer's instructions with their corresponding adhesive systems. The teeth were th

... Show More
Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of Nonlinear PID Neural Controller for the Speed Control of a Permanent Magnet DC Motor Model based on Optimization Algorithm
...Show More Authors

In this paper, the speed control of the real DC motor is experimentally investigated using nonlinear PID neural network controller. As a simple and fast tuning algorithm, two optimization techniques are used; trial and error method and particle swarm optimization PSO algorithm in order to tune the nonlinear PID neural controller's parameters and to find best speed response of the DC motor. To save time in the real system, a Matlab simulation package is used to carry out these algorithms to tune and find the best values of the nonlinear PID parameters. Then these parameters are used in the designed real time nonlinear PID controller system based on LabVIEW package. Simulation and experimental results are compared with each other and showe

... Show More
View Publication Preview PDF