Preferred Language
Articles
/
ijs-9534
The Spectrum and the Numerical Range of the Product of Finite Numbers of Automorphic Composition Operators on Hardy Space 2
...Show More Authors

Throughout this paper we study the properties of the composition operator
C
p1  o
p2  o…o
pn  induced by the composition of finite numbers of special
automorphisms of U,
pi  (z)  i
i
p z
1 p z


Such that pi  U, i  1, 2, …, n, and discuss the relation between the product of
finite numbers of automorphic composition operators on Hardy space H2 and some
classes of operators.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Using simulation to estimate parameters and reliability function for extreme value distribution
...Show More Authors

   This study includes Estimating scale parameter, location parameter  and reliability function  for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).

 Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Educational And Psychological Researches
Psychological Comfort and Its Relationship to Job Performance among Secondary School Teachers
...Show More Authors

The current research aims to identify the level of both psychological comfort and job performance among a sample of high school teachers for the academic year (2019-2020). The researcher has built two tools to measure psychological comfort, and one to measure job performance. The researcher applied the two scales to a random stratified sample of (100) male and female teachers. The results showed a low level of feeling with psychological comfort among secondary school teachers and a good level of sense of job performance. There is no statistically significant difference in the level of psychological comfort according to gender. There is a significant difference in psychological comfort according to the variable of the length of service in

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Wiadomości Lekarskie
Chemo-sensory loss and FUT2 gene in COVID-19 infected Iraqi dentists
...Show More Authors

Aim: To find any association between specific ABO blood groups and FUT2 secretory status and COVID-19 in a sample of Iraqi dentists. Materials and Methods: For each participant, a questionnaire including demography, COVID-19 status, blood grouping, and RH factor, with chemo-sensitive symptoms was recorded. The saliva samples were collected and DNA was extracted from leukocytes. Sequencing of molecular detection of the FUT2 gene by real-time PCR and the data was done, whilst drawing the phylogenetic tree. Results: Out of 133, most of the dentists were female 61%, most were just under 35 years of age. The most participants in this study were predominantly with blood group O (40%), followed by B, A, and AB, with (90%) of them were RH+.

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Temperatture esttiimattiion off EXDRA and SSUMI dwarff Nova systtems from spectroscopic data
...Show More Authors

The seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.

View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Iraqi Journal Of Physics
Optical and structural study for DLC thin films prepared by plasma jet
...Show More Authors

Diamond-like carbon (DLC) homogeneous thin films were deposited from cyclohexane (Ccyclohexane (Ccyclohexane (Ccyclohexane (C cyclohexane (Ccyclohexane (Ccyclohexane (C cyclohexane (Ccyclohexane (C 6H12 ) liquid by using a plasma jet system which operates with alternating high voltage 7.5 which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5 which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5 which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5 which operates with alternating high voltage 7.5which operates with al

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iraqi Journal Of Physics
Linear and Non-Linear Optical Properties for Organic Semiconductor (CuPc) Thin Films
...Show More Authors

Thin films of CuPc of various thicknesses (150,300 and 450) nm have been deposited using pulsed laser deposition technique at room temperature. The study showed that the spectra of the optical absorption of the thin films of the CuPc  are two bands of absorption one in the visible region at about 635 nm, referred to as Q-band, and the second in ultra-violet region where B-band is located at 330 nm. CuPc thin films were found to have direct band gap with values around (1.81 and 3.14 (eV respectively. The vibrational studies were carried out using Fourier transform infrared spectroscopy (FT-IR). Finally, From open and closed aperture Z-scan data non-linear absorption coefficient and non-linear refractive index have been calculated res

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Dec 08 2021
Journal Name
Scientific Reports
Weakly Supervised Sensitive Heatmap framework to classify and localize diabetic retinopathy lesions
...Show More Authors
Abstract<p>Vision loss happens due to diabetic retinopathy (DR) in severe stages. Thus, an automatic detection method applied to diagnose DR in an earlier phase may help medical doctors to make better decisions. DR is considered one of the main risks, leading to blindness. Computer-Aided Diagnosis systems play an essential role in detecting features in fundus images. Fundus images may include blood vessels, exudates, micro-aneurysm, hemorrhages, and neovascularization. In this paper, our model combines automatic detection for the diabetic retinopathy classification with localization methods depending on weakly-supervised learning. The model has four stages; in stage one, various preprocessing techniques are app</p> ... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Mining categorical Covid-19 data using chi-square and logistic regression algorithms
...Show More Authors

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref