Preferred Language
Articles
/
NRYJRocBVTCNdQwCMUAw
Morphometric Analysis of the Mental Foramen Variation in an Iraqi Population by Using Cone-Beam Computed Tomography
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
The Writer Authentication by Using Syllables Frequency
...Show More Authors

An approach is depended in the recent years to distinguish any author or writer from other by analyzing his writings or essays. This is done by analyzing the syllables of writings of an author. The syllable is composed of two letters; therefore the words of the writing are fragmented to syllables and extract the most frequency syllables to become trait of that author. The research work depend on analyzed the frequency syllables in two cases, the first, when there is a space between the words, the second, when these spaces are ignored. The results is obtained from a program which scan the syllables in the text file, the performance is best in the first case since the sequence of the selected syllables is higher than the same syllables in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 29 2018
Journal Name
Construction Research Congress 2018
Consideration of Worker Safety in the Design Process: A Statistical-Based Approach Using Analysis of Variance (ANOVA)
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 16 2023
Journal Name
مجلة الاستاذ للعلوم الانسانية والاجتماعية- كلية التربية ابن رشد – جامعة بغداد،
Using the Theory of Conceptual Metaphor in Two Sonnets by Victorian Female Poets
...Show More Authors

This study has applied the theoretical framework of conceptual metaphor theory to the analysis of the source and target domains of metaphors that are used in two English nineteenth century sonnets, both written by contemporaneous female poets. The quantitative and qualitative results of the textual analysis have clearly revealed that Elizabeth Barrett Browning’s sonnet 23 centres around the conceptual mapping of the journey of love and life with that of possession. In contrast, Christina Rossetti’s sonnet Remember tackles the central conceptual mapping of death as a journey in relation to its further experiential connections. In addition, the application of conceptual metaphor theory in identifying the frequencies and densities of metap

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of American Science
Morphohistological study of the tongue in local mice species by using special stain
...Show More Authors

Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
Investigation of the Porosity of Certain Iraqi Clay Deposits by Mercury Porosimeter
...Show More Authors

Pore volume, pore diameter, and pore volume distribution of three of Iraqi natural clay deposites were measured using mercury intrusion porosimetry .The clays are white kaolin, colored kaolin, and bentonite .The results showed that the variation of the pore area of the clay deposites followed the following order :- Coloured Kaolin > White Kaolin > Bentonite While the pore volume may be arranged as in the following sequence:- White Kaolin > Coloured Kaolin >Bentonite Also , Bentonite exhibits the narrow range pore size distribution than the white and coloured kaolin.

View Publication Preview PDF
Crossref
Publication Date
Wed Jul 02 2025
Journal Name
International Journal Of Biology And Chemistry
Preparation and Characterization of Nano-Iron Oxide by using Iraqi Orange Plant Extract and Testing for Adsorption Efficiency
...Show More Authors

Nanomaterials, including nanoparticles such as iron oxide nanoparticles, have received great attention from researchers due to their unique properties and applications. There are several diverse methods, including chemical, physical, and green biological methods, to prepare iron oxide nanoparticles. The green method was chosen because it is safer, purer, and less toxic compared to other methods. Therefore, the green method is a promising and environmentally friendly method in the near future. The aqueous extract of Iraqi orange leaves was used to prepare nano iron oxide, it was examined structurally and spectrally by several techniques (X-ray diffraction- XRD, Fourier transform infrared - FT-IR, field emission scanning electron micr

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Diagnostic Approach of Atypical Cells in Effusion Cytology Using Computerized Image Analysis
...Show More Authors

Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
مجلة المستنصرية للعلوم والتربية
Calculation of Electron Drift Velocity in Xenon Gas Using Boltzmann Equation Analysis
...Show More Authors

Publication Date
Sat Jan 19 2019
Journal Name
Iraqi Journal Of Agricultural Sciences
ECONOMICAL BEHAVIOR ANALYSIS OF AGRICULTURAL COMPANIES IN IRAQ USING TRANSLOG COST FUNCTION
...Show More Authors

This research aims to identify the productive relationship nature among the elements used in the agricultural companies by estimating the translog cost function. It also aims to recognize the possibility of substituting these elements with each other, to identify the nature of revenues, and economies scale through elasticity of other cost. This research goes further to define the typical use of resources, identify the performance of the companies and their contribution in controlling their cost, and estimating elasticity of substitution (Allen-Uzawa), (Morishima).  The translog cost function was estimated so as the total cost of the agricultural companies is a function of the prices of production and production quantity output  el

... Show More
View Publication
Crossref