Preferred Language
Articles
/
bsj-7959
A Comparison between Ericson's Formulae Results and Experimental Data Using New Formulae of Single Particle Level Density
...Show More Authors

The partial level density PLD of pre-equilibrium reactions that are described by Ericson’s formula has been studied using different formulae of single particle level density . The parameter  was used from the equidistant spacing model (ESM) model and the non- equidistant spacing model (non-ESM) and another formula of  are derived from the relation between  and level density parameter . The formulae used to derive  are the Roher formula, Egidy formula, Yukawa formula, and Thomas –Fermi formula. The partial level density results that depend on  from the Thomas-Fermi formula show a good agreement with the experimental data.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 29 2018
Journal Name
Arab Science Heritage Journal
الجمع الجمع بين الفقه والحديث عند الفقيه والمحدث المعاصر
...Show More Authors

Holly Quran and prophetic sunna is the two main sources for this religion and the formers derived the rules from them directly . the jurisprudent was a scientist in commentary of holly Quran , narrators of prophetic Tradition, jurisprudence and linguistics in the same time. The sciences of commentary , jurisprudence , Tradition and linguistics were integral system without any distinguishing until these sciences started to distinguish in their limits and ranges.

View Publication Preview PDF
Publication Date
Wed Mar 15 2023
Journal Name
مجلة بحوث الشرق الاوسط
جدلية العلاقة بين السلطة والعنف في الفكر السياسي الاسلامي
...Show More Authors

View Publication
Publication Date
Mon Nov 26 2018
Journal Name
Arab Science Heritage Journal
التباين بين مفهوم المشروع الإسلامي الحضاري والمشروع العولمي الغربي
...Show More Authors

The Islamic civilizational project has become anurgent necessity when Muslims and Arabs faced in recent years, with serious of challenges and the dangers that surrounded them; Globalization is one of these challenges.

View Publication Preview PDF
Publication Date
Tue Sep 27 2022
Journal Name
Arab Science Heritage Journal
الشعرية بين عالمي نازك الملائكة وفدوى طوقان (دراسة موازنة)
...Show More Authors

The concept of poetics has different dimensions, part of which is related to the creative achievement, and part is related to the critical perspective. The task of this research

View Publication Preview PDF
Crossref
Publication Date
Thu Jul 29 2021
Journal Name
Arab Science Heritage Journal
اللغة ما بين العامية والفصحى في مجلة لغة العرب
...Show More Authors

The Arabic language is one of the important magazines that issued in our contemporary history not only on the Iraqi level but according Arabic one as well because it considered

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 02 2008
Journal Name
Political Sciences Journal
امن الخليج العربي بين الاحتكار الامريكي ورغبة المشاركة الاوربية
...Show More Authors

امن الخليج العربي بين الاحتكار الامريكي و رغبة المشاركة الاوربية

View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
DYE REMOVAL FROM TEXTILE WASTEWATER BY COAGULATION USING ALUM AND PAC
...Show More Authors

Removal of solar brown and direct black dyes by coagulation with two aluminum based
coagulants was conducted. The main objective is to examine the efficiency of these
coagulants in the treatment of dye polluted water discharged from Al-Kadhymia Textile
Company (Baghdad-Iraq). The performance of these coagulants was investigated through
jar test by comparing dye percent removal at different wastewater pH, coagulant dose,
and initial dye concentration. Results show that alum works better than PAC under acidic
media (5-6) and PAC works better under basic media (7-8) in the removal of both solar
brown and direct black dyes. Higher doses of PAC were required to achieve the
maximum removal efficiency under optimum pH co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 17 2012
Journal Name
Journal Of The College Of Basic Education
Image Retrieval Using DCT/KWT and D4/KWT in Distributed System
...Show More Authors

This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff

... Show More
Preview PDF
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref