Preferred Language
Articles
/
ihfhL48BVTCNdQwCol5k
Effect of Cutting Angle for a Locally Assembling Motorized Vibration Cutter on Some Operational Characteristics Used for Date Palm Fronds Cutting
...Show More Authors

Publication Date
Fri Dec 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Study of Mouth Depth for Some Local Cyprinidae
...Show More Authors
Abstract<p>The aim of this study was to identify the depth of the mouth and its shape in some local fish belonging to the Cyprinidae family, and the extent to which the depth of the mouth is related to the way of feeding and the nature of food as well as the feeding habits of those species collected specifically from the Tigris River, the results showed a relationship of depth oral cavity with head length was highly significant at (P < 0.01) for all studied species. Also, there was a highly significant relationship between the height of the pharyngeal tooth-bearing bone and the depth of the oral cavity for fish of this local family.</p>
View Publication
Scopus Crossref
Publication Date
Mon Jan 01 2007
Journal Name
Journal Of Al-nahrain University
Applications Of Strong-Lensing For Some Gravitational Lenses
...Show More Authors

In our work present, the application of strong-Lensing observations for some gravitational lenses have been adopted to study the geometry of the universe and to explain the physics and the size of the quasars. The first procedure was to study the geometrical of the Lensing system to determine the relation between the redshift of the gravitational observations with its distances. The second procedure was to compare between the angular diameter distances "DA" calculated from the Euclidean case with that from the Freedman models, then evaluating the diameter of the system lens. The results concluded that the phenomena are restricted to the ratio of distance between lens and source with the diameter of the lens noticing.

Publication Date
Thu Nov 18 2021
Journal Name
Iraqi Journal Of Physics
The study of nuclear structure for some nuclei
...Show More Authors

An analytical form of the ground state charge density distributions
for the low mass fp shell nuclei ( 40  A  56 ) is derived from a
simple method based on the use of the single particle wave functions
of the harmonic oscillator potential and the occupation numbers of
the states, which are determined from the comparison between theory
and experiment.
For investigating the inelastic longitudinal electron scattering form
factors, an expression for the transition charge density is studied
where the deformation in nuclear collective modes is taken into
consideration besides the shell model space transition density. The
core polarization transition density is evaluated by adopting the
shape of Tassie mod

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 03 2020
Journal Name
Technology Reports Of Kansai University
Results for Some Groups of PSL (2, F)
...Show More Authors

Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
The study of nuclear structure for some nuclei
...Show More Authors

 An analytical form of the ground state charge density distributions
for the low mass fp shell nuclei ( 40  A  56 ) is derived from a
simple method based on the use of the single particle wave functions
of the harmonic oscillator potential and the occupation numbers of
the states, which are determined from the comparison between theory
and experiment.
For investigating the inelastic longitudinal electron scattering form
factors, an expression for the transition charge density is studied
where the deformation in nuclear collective modes is taken into
consideration besides the shell model space transition density. The
core polarization transition density is evaluated by adopting the
shape of Tass

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 11 2021
Journal Name
Journal Of Computing And Information Technology
A Survey on Emotion Recognition for Human Robot Interaction
...Show More Authors

With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (7)
Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Review on Models for Evaluating Rock Petrophysical Properties
...Show More Authors

The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref