Preferred Language
Articles
/
ijp-329
Data visualization and distinct features extraction of the comet Ison 2013
...Show More Authors

The distribution of the intensity of the comet Ison C/2013 is studied by taking its histogram. This distribution reveals four distinct regions that related to the background, tail, coma and nucleus. One dimensional temperature distribution fitting is achieved by using two mathematical equations that related to the coordinate of the center of the comet. The quiver plot of the gradient of the comet shows very clearly that arrows headed towards the maximum intensity of the comet.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jul 27 2023
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Clinicopathological Features of Colorectal Cancer in the Iraqi Population Focusing on Age and Early-Onset of Malignancy: A Descriptive Cross-Sectional Study
...Show More Authors

Background: Colorectal cancer (CRC) is one of the top ten most common cancers worldwide. There are multiple risk factors for CRC, one of which is aging. However, in recent years, CRC has been reported in children. Objective: To describe the main characteristics and symptoms of CRC as well as highlight pathologic data for early-onset CRC. Methods: 79 CRC patients were recruited from the Oncology Teaching Hospital in the period February–December 2022. A questionnaire was used to collect demographic and clinical data. Results: 25 (31.6%) of patients were below 50 years of age. 52 (65.8%) patients had tumors in the colon. The most common symptom is bleeding per rectum in both age groups. There was no significant difference in patholog

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
IMPLEMENTATION OF THE SKIP LIST DATA STRUCTURE WITH IT'S UPDATE OPERATIONS
...Show More Authors

A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.

View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
2015 Ieee Conference On Computational Intelligence In Bioinformatics And Computational Biology (cibcb)
Granular computing approach for the design of medical data classification systems
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Materials Chemistry And Physics
Structural, surface electronic bonding, optical, and mechanical features of sputtering deposited CrNiN coatings with Si and Al additives
...Show More Authors

View Publication
Scopus (8)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun May 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Combining Arabic Nested Noun Compound and Collocation Extraction Using Linguistic and Statistical Approach
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Wed Nov 02 2022
Journal Name
Annals Of Forest Research
EXTRACTION AND OPTIMIZATION LIGNINOLYTIC ENZYMES LACCASE, LIGNIN PEROXIDASE AND MANGANESE PEROXIDASE FROM TERMITE
...Show More Authors

Publication Date
Sun Jun 25 2023
Journal Name
Iraqi Journal Of Agricultural Sciences
EXTRACTION, FRACTIONATION, AND SEPERATIONE OF CYNAROSIDE AND SCOLYMOSIDE FROM Cynara scolymus L. GROWN IN IRAQ
...Show More Authors

Artichoke (Cynara scolymus L.) is a nutritious vegetable that grown all over the world. It is a promising herbal plant, rich in bioactive components. It is considered as medicinal plant due to its nutritional and phytochemical composition, especially high proportion of phenolic compounds. The primary aim of this study was to achieve chemical profile analyses of artichoke for different phytochemcials, especially Scolymoside and Cynaroside. Methanolic crude was extracted from Artichoke leaves by rotary evaporator and separated by column chromatography. The fractions monitored by Thin Layer Chromatography (TLC), and identified in High-Pressure Liquid Chroma

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Estimation of Extract Yield and Mass Transfer Coefficient in Solvent Extraction of Lubricating Oil
...Show More Authors

An investigation was conducted to suggest relations for estimating yield and properties of the improved light lubricating oil fraction produced from furfural extraction process by using specified regression.

Mass transfer in mixer-settler has been studied. Mass transfer coefficient of continuous phase, mass transfer coefficient of dispersed phase and the overall mass transfer coefficient extraction of light lubes oil distillate fraction by furfural are calculated in addition to all physical properties of individual components and the extraction mixtures.

The effect of extraction variables were studied such as extraction temperature which ranges from 70 to 110°C and solvent to oil ratio which ranges from 1:1 to 4:1 (wt/wt

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref