Preferred Language
Articles
/
RhaxdIcBVTCNdQwCAUyI
ON CONVEX FUNCTIONS, $E$-CONVEX FUNCTIONS AND THEIR GENERALIZATIONS: APPLICATIONS TO NON-LINEAR OPTIMIZATION PROBLEMS
...Show More Authors

Contents IJPAM: Volume 116, No. 3 (2017)

View Publication
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Adsorption Study for Trifluralin on Iraqi ? –Alumina
...Show More Authors

Equilibrium adsorption isotherm for the removal of trifluralin from aqueous solutions using ? –alumina clay has been studied. The result shows that the isotherms were S3 according Giels classification. The effects of various experimental parameters such as contact time, adsorbent dosage, effect of pH and temperature of trifluralin on the adsorption capacities have been investigated. The adsorption isotherms were obtained by obeying freundlich adsorption isotherm with (R2 = 0.91249-0.8149). The thermodynamic parameters have been calculated by using the adsorption process at five different temperature, the values of ?H, ?G and ?S were (_1.0625) kj. mol-1, (7.628 - 7.831) kj.mol-1 and (_2.7966 - _2.9162) kg.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Thu Apr 06 2017
Journal Name
Global Journal Of Engineering Science And Researches 4(2348-8034):48-52
ON SEMI-STRONG (WEAK)CJ-TOPLOGICAL SPACES
...Show More Authors

Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Agricultural And Statistical Sciences
ON ERROR DISTRIBUTION WITH SINGLE INDEX MODEL
...Show More Authors

In this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.

Scopus
Publication Date
Mon Feb 25 2019
Journal Name
Iraqi Journal Of Physics
Effect of green colour on glass quality
...Show More Authors

The study of green colour in glass has a special importance on the glass quality, specially the effect of ferrous oxides content of the limestone. Results obtained that there was a reduction in green colour when different ferrous oxide contents in the limestone were added in glass production, limestone sources from two quarries, and the first contains 0.67% ferrous oxide and the second posses less ferrous oxide.

Reduction of green colour showed higher transmittance12% and it could be suggested that reduction of ferrous oxides content in the limestone is of special importance on the optical properties of glass.

View Publication Preview PDF
Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Physics: Conference Series
Simulation on Rotation Curve of Spiral Galaxies
...Show More Authors
Abstract<p>The problem of dark matter in galaxies is still one of the most important unsolved problems in the contemporary extragalactic astronomy and cosmology. The existence of a significant dynamic difference between the visible mass and the conventional mass of galaxies firmly establishes observational result. In this paper an unconventional explanation will be tested as an alternative to the cold dark matter hypothesis; which is called the modified Newtonian dynamics (MOND).</p><p>In this paper covers the simulation of galactic evolutions; where the two hypotheses are tested via the rotation curves. N-body simulation was carried adopting different configuration lik</p> ... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (23)
Scopus Crossref
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
On Čech fuzzy soft bi-clouser spaces
...Show More Authors

View Publication
Scopus Crossref