Preferred Language
Articles
/
bsj-739
Influence of alcoholic extract crude fenugreek seeds on fertility in male mice eggs
...Show More Authors

These dust designed to identify the extent of the impact of alcohol Almstkhalss saponin from fenugreek seeds on fertility in male mice eggs by tracking some physiological changes and tela that may occur to some members of the device Altcatherthe

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Sat Jun 26 2021
Journal Name
2021 Ieee International Conference On Automatic Control & Intelligent Systems (i2cacis)
Vulnerability Assessment on Ethereum Based Smart Contract Applications
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Tue Nov 19 2024
Journal Name
Baghdad Science Journal
On En- Prime Compactly Packed Acts over Monoid
...Show More Authors

في هذا العمل تم دراسة المقاسات الاولية من النمطEn المرصوصة المكتضة ودراسة  تعيم هذا المفهوم الى مفهوم الآثار الاولية من النمط En المرصوصة المكتضة حيث تم دراسة بعض العلاقات والتشخيصات الخاصة بهذه المفاهيم حيت تم برهنت العلاقات الخاصة بمفهوم المقاسات الاولية من النمط En المرصوصة المكتضة ليكن ₩ مقاس و كل مقاس جزئي  هو اولي من النمط  En  فان المقاس ₩ هو مقاس اولي من النمط En مرصوص مكتض اذا و فقظ اذا كل مقاس جزئي د

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Misan Journal Of Academic Studies
A review on various methods for dehazing images
...Show More Authors

In this paper, a literature survey was introduced to study of enhancing the hazy images , because most of the images captured in outdoor images have low contrast, color distortion, and limited visual because the weather conditions such as haze and that leads to decrease the quality of images capture. This study is of great importance in many applications such as surveillance, detection, remote sensing, aerial image, recognition, radar, etc. The published researches on haze removal are divided into several divisions, some of which depend on enhancement the image, some of which depend on the physical model of deformation, and some of them depend on the number of images used and are divided into single-image and multiple images dehazing model

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Improve topic modeling algorithms based on Twitter hashtags
...Show More Authors
Abstract<p>Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned</p> ... Show More
View Publication
Scopus (20)
Crossref (19)
Scopus Crossref
Publication Date
Tue Dec 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Comparison between Electroplating and Electroless on Plastic Surface
...Show More Authors

 

We report a method of converting non-conductive plastic surfaces into conductive by plating either copper electroless or copper electroplating -carbon black containing bending Agent onto Perspex plastics . Various approaches have been studied in order to comparing properties of the plated copper for two methods such as scanning electron microscopy (SEM),thickness, roughness, porosity, tensile Strength and elongation. The results show that the surface of electroplating was uniform, compact, and continuous and it had an obvious metallic sheen, while the surface of plated copper for electroless for it had many pores. Also observed that the coating was composed of small cells. Thes

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
PART 2 An Experiment on the Box plot
...Show More Authors

Abstract

These experiments seek to investigate the effects of the fixed variations to the basic box plot on subjects' judgments of the box lengths. The study consists of two experiments, were constructed as an extension to the experiments carried out previously by Hussin, M.M. (1989, 2006).  Subjects were asked to judge what percentage the shorter represented of the longer length in pairs of box lengths and give an estimate of percentage, one being a standard plot and the other being of a different box length and also varying with respect to other elements such as, box width or whisker length. When he (1989) suggested in the future research points (1, 2), the changing length of the st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
Free Head Shear Test on Decomposed Granite Soil
...Show More Authors

The study presents the test results of Completely Decomposed Granite (CDG) soil tested under drained triaxial compression, direct shear and simple shear tests. Special attention was focused on the modification of the upper halve of conventional Direct Shear Test (DST) to behave as free
head in movement along with vertical strain control during shear stage by using Geotechnical Digital System (GDS). The results show that Free Direct Shear Test (FDST) has clear effect on the measured shear stress and vertical strain during the test. It has been found that shear strength
parameters measured from FDST were closer to those measured from simple shear and drained triaxial compression test. This study also provides an independent check on

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
On Large-Small submodule and Large-Hollow module
...Show More Authors
Abstract<p>The goal of this research is to introduce the concepts of Large-small submodule and Large-hollow module and some properties of them are considered, such that a proper submodule N of an R-module M is said to be Large-small submodule, if N + K = M where K be a submodule of M, then K is essential submodule of M ( K ≤<sub>e</sub> M ). An R-module M is called Large-hollow module if every proper submodule of M is Large-small submodule in M.</p>
View Publication
Scopus (17)
Crossref (6)
Scopus Crossref