Preferred Language
Articles
/
uRetC5IBVTCNdQwCP51O
Formulation of approximate mathematical model for incoming water to some dams on Tigris and Euphrates Rivers using spline function
...Show More Authors

n this paper, we formulate three mathematical models using spline functions, such as linear, quadratic and cubic functions to approximate the mathematical model for incoming water to some dams. We will implement this model on dams of both rivers; dams on the Tigris are Mosul and Amara while dams on the Euphrates are Hadetha and Al-Hindya.

Scopus
View Publication
Publication Date
Fri May 01 2020
Journal Name
Journal Of Engineering
Parametric Study on Unconnected Piled Raft Foundation Using Numerical Modelling
...Show More Authors

Piled raft is commonly used as foundation for high rise buildings. The design concept of piled raft foundation is to minimize the number of piles, and to utilize the entire bearing capacity. High axial stresses are therefore, concentrated at the region of connection between the piles and raft. Recently, an alternative technique is proposed to disconnect the piles from the raft in a so called unconnected piled raft (UCPR) foundation, in which a compacted soil layer (cushion) beneath the raft, is usually introduced.  The piles of the new system are considered as reinforcement members for the subsoil rather than as structural members. In the current study, the behavior of unconnected piled rafts systems has been studie

... Show More
View Publication Preview PDF
Crossref (11)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (19)
Crossref (5)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
2016 6th International Conference On Information Communication And Management (icicm)
Enhancing case-based reasoning retrieval using classification based on associations
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Thu Feb 19 2026
Journal Name
Al Ghary Journal Of Economic And Administrative Sciences
The impact of strategic knowledge on strategic improvisation: an exploratory study of some private hospitals in the city of Baghdad
...Show More Authors

View Publication
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Kerbala University
Synthesis And Biological Activity Of Some New Compounds Containing 1,2,4-Triazole And Their Derivatives
...Show More Authors

Condensation of 1,2- dibromo ethane with para hydroxy benzoic acid gave 1,2-Ethane-bis- 4-oxybenzoic [1]. This Compound was converted with the thionyl chloride to give 1,2-Ethane-bis- 4-oxybenzoyl chloride [2]. Reaction of compound [2] with thiosemicarbizades gave 1,2-Ethanebis[4-oxybenzoyl-thiosemicarbazide] [3] and opteined 1,2-Ethane-bis[3-mercapto-5-phenoxy- 1,2,4-triazole] [4] from treatment compound [3] with NaOH (4%) .The new compounds 1,2- Ethane-bis[3-(substituted thioacyl)-4-(substituted acyl)-5 phenoxy-1,2,4-triazole] [5a-d] and 1,2- Ethane-bis[3-(substituted alkylthio)-5 phenoxy-1,2,4-trizole] [5e-f] derived from compound [4] were synthesized and characterized by physical and spectral data. All the compounds [4], [5a-d] and [5e-

... Show More
Publication Date
Sat Jan 01 2005
Journal Name
Al-fath Journal
Synthesis And Characterisation Of Some Lanthanide Ion(III) ComplexesWith Mixed Ligands (Nicotinamide And Benzimidazole)
...Show More Authors

Complexes of Lanthanide ione Ln(III) =La(III) , Ce(III),Pr(III) and Nd(III) withligands of nicotinamide (na) and Benzimidazole (BIMD) have been prepared withgeneral formula [M(na)3(BIMD)3](NO3) where :M = Ln(III) = La(III) , Ce(III) , Gd(III) , Nd(III) .Na = nicotinamide = C7H6N2OBIMD = Benzimidazole = C7H6N2All compounds have been characterized by spectroscopic methods [FT-IR , UV-VIS ,AAS] , microanalysis (C.H.N) Along with conductivity measurements , solubility ,melting point , theroitical measurment by using chem office 3D prog .Model (2000) .Frome the above data the proposed moleculer structure for all complexes with its ionsis octahydral geometries

Preview PDF
Publication Date
Sun Mar 03 2013
Journal Name
Journal Of Al-nahrain University
Synthesis and Characterization of Some New 1,2,3-Triazole, Pyrazolin-5-one and thiazolidinone Derivatives
...Show More Authors

Five membered heterocyclics derivatives were synthesized in this work by three routes. The first route includes the synthesis of N-benzoic acid 1,2,3,-triazole derivatives (3),(4) by diazotation of methyl-2-amino benzoate and treating the resulted salt (1) with sodium azide and ethyl acetoacetate or acetyl acetone, respectively. In the second route, derivatives of pyrazole (8) pyrazolin-5-one (9), (10) were prepared by the reaction of the salt (1) with some active methylene compounds to give the corresponding hydrazones derivatives (5-7) which then they were treated with hydrazine hydrate. The third route afforded the synthesis of three derivatives (12), (15a), (15b) of thiazolidinone by two different methods. AII compounds were confirmed b

... Show More
Preview PDF
Publication Date
Mon Aug 03 2015
Journal Name
Zanco Journal Of Pure And Applied Sciences
Synthesis and Characterization of Some New Substituted 5-Bromo Isatin and Their Antimicrobial Activity
...Show More Authors

New 2-amino thiazole ,oxodiazole, sulphonilamide and diazin derivatives of N-(α-chloro aceto)-3-(tolyl imino)-5-bromo-2-oxo-indole(2) have been synthesized .The preparation process started by the reaction of 5-bromo isatin with  P-toluidine in the presence of glacial acetic acid and dimethylformamide(DMF) as a solvent to give  3-(tolyl imino)5-bromo-1H-indole-2-one.(1), Compound (1) with sodium hydride  in dimethylformamide(DMF) at 0C0 gave a suspension of the sodium salt of Schiff base derivative and subsequent reaction with monochloroacetylchloride obtained  the intermediate compound(2).Compound(2) was  reacted with different reagents  in four routes.The first route involved direct reaction with substituted  2-aminobenzothiazole u

... Show More
View Publication Preview PDF