In this work the strain energy of tetrahedrane and its nitrogen substituted molecules were calculated by isodesmic reaction method according to DFT quantum chemical fashion, the used basis set was 6-31G/B3-LYP, in addition all structures were optimized by RM1 semi-empirical method. From the obtained data we estimate an empirical equation connect between strain energy of the molecule with charge functions represented by dipole moment of the molecule plus accumulated charge density involved within the tetrahedron frame plus the number of nitrogen atoms. The results indicate the charge spreading factors by polarization and processes are the most important factors in decreasing the strain energy.
The current research aims at: - Identifying the role played by the leadership in empowerment and organizational learning abilities and their reflection on the knowledge capital, and the extent to which these concepts can be applied effectively at Wasit University. The problem of research .... In a series of questions: The most important is that the dimensions leadership empowerment and distance learning organizational capacity correlation relationship and impact and significant statistical significance with the capital knowledge.
To understand the nature of the relationship and the impact between the variables, leadership was adopted by empowerment as the fir
... Show MoreIn this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was s
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreThe complexity of multimedia contents is significantly increasing in the current world. This leads to an exigent demand for developing highly effective systems to satisfy human needs. Until today, handwritten signature considered an important means that is used in banks and businesses to evidence identity, so there are many works tried to develop a method for recognition purpose. This paper introduced an efficient technique for offline signature recognition depending on extracting the local feature by utilizing the haar wavelet subbands and energy. Three different sets of features are utilized by partitioning the signature image into non overlapping blocks where different block sizes are used. CEDAR signature database is used as a dataset f
... Show MoreAbstract
This research’s goal is to restore and to revive the jurisprudence of Mother of Believers (Um alMuaamineen) “Um Salmah” "may God bless her", and to highlight her outstanding assimilation and understanding of religion and her conscious thought. The current research is a comparative scientific theoretical study represented in the comparison of jurisprudence of “Um Salamah” with Hadiths of fasting and pilgrimage rules as well as the duration mentioned in jurisprudence of for doctrines( 4 schools of thought )to identify these hadiths with the inclusion and discussion of their evidence.
The current research included two topics: the first one is to identify and introduce
... Show MoreThis study was conducted to evaluate the efficacy of 6 isolates of Pseudomonas fluorescens and Trichoderma harzianum and there combination against Fusarium tomato wilt disease caused by Fusarium oxysporum F.sp. Lycopersisi under green house condition .The isolates of bacteria (B3) and Trichoderma (T1) were found to be highly effective in reducing the disease incidence to 13.3% , 21% respectively , compared to control treatment (40%).Furthermore, disease severity was reduced to 28 and 30% respectively in comparison to control (90%) .Colonization of the roots (cfu /g fresh root weight )by the two isolates whether alon or together was extremely high . The combination treatment had a high ability in reducing disease incidenece and sev
... Show MoreFingerprint recognition is one among oldest procedures of identification. An important step in automatic fingerprint matching is to mechanically and dependably extract features. The quality of the input fingerprint image has a major impact on the performance of a feature extraction algorithm. The target of this paper is to present a fingerprint recognition technique that utilizes local features for fingerprint representation and matching. The adopted local features have determined: (i) the energy of Haar wavelet subbands, (ii) the normalized of Haar wavelet subbands. Experiments have been made on three completely different sets of features which are used when partitioning the fingerprint into overlapped blocks. Experiments are conducted on
... Show More