tock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.
Abstract: Coriandrum sativum leaves are used in folk medicine to treat several diseases such as digestive system disorder, diabetes, and hyperlipidemia. This study was designed to investigate the effect of aqueous extract of Coriandrum sativum on the structure and function of kidney, 30 males of white Swiss mice Mus musculus were divided randomly to three groups with 10 mice in each group. Animals of first group (control group) had been given orally 0.1 ml of tap water, animals in the second group had been treated orally with 0.1 of single dose (125 mg/Kg b. w./day) of C. sativum leaves extract and animals in the third group has been treated orally with 0.1 ml (250mg/Kg. b. w./day) of the same extract for 30 days. At the end of experiment,
... Show MorePositron annihilation lifetime (PAL) technique has been employed to
study the microstructural changes of polyurethane (PU), EUXIT 101
and epoxy risen (EP), EUXIT 60 by Gamma-ray irradiation with the
dose range (95.76 - 957.6) kGy. The size of the free volume hole and
their fraction in PU and EP were determined from ortho-positronium
lifetime component and its intensity in the measured lifetime spectra.
The results show that the irradiation causes significant changes in the
free volume hole size (Vh) and the fractional free volume (Fh), and
thereby the microstructure of PU and EP. The results indicate that
the γ-dose increases the crystallinity in the amorphous regions of PU
and increas
The effect of metal nanoparticles on the anaerobic digestion of sludge and the sludge bacterial community are still not well-understood, and both improvements and inhibitions have been reported. This study investigated the impact of 2, 10, and 30 mg/g TS silver and copper oxide nanoparticles (AgNPs and CuONPs) on the mesophilic anaerobic digestion of sludge and the bacterial community structure. The reactors were monitored for changes in tCOD, sCOD, TS, VS, biogas generation, and cell viability. Also, the relative abundance and taxonomic distribution of the bacterial communities were analyzed at the phylum and genus levels, including the genera involved in anaerobic digestion. Both AgNPs and CuONPs exhibited some inhibition on anaer
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreIris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin
... Show More