Preferred Language
Articles
/
0hcaD5EBVTCNdQwC1pJr
A study effect of thyme on biochemical and histological changes in liver of male rats
...Show More Authors

Publication Date
Sat Jan 20 2018
Journal Name
International Journal Of Medical Research & Health Sciences
The Influence of Thyroid Hormones on Leptin and Resistin Levels in Hyperthyroid Female Patients
...Show More Authors

Hyperthyroidism or thyrotoxicosis occurs due to excess release of thyroid hormone. These hormones regulate the body’s energy balance and have effects on adipokine level. There are several reports suggesting interrelation between adipokines (resistin and leptin) with thyroid dysfunction. Objectives: This study was established to investigate the effect of thyroid hormones in hyperthyroidism state on the level of some adipokines, leptin and resistin; in comparison with control. Patients and Methods: The present study included 50 Iraqi female patients with hyperthyroidism with age ranged between 30-58 years and 30 healthy controls with age ranged between 30-53 years. Serum samples were collected from study groups. The levels of thyroid hormon

... Show More
Publication Date
Wed May 01 2019
Journal Name
Astrophysics And Space Science
On the primordial specific frequency of globular clusters in dwarf and giant elliptical galaxies
...Show More Authors

View Publication
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jul 08 2022
Journal Name
Innovation Of Businesses, And Digitalization During Covid-19 Pandemic
The Impact of Political Stability and Macroeconomic Variables on Foreign Direct Investment in Turkey
...Show More Authors

Foreign direct investment (FDI) is one of the most practical types of foreign investment. FDI contributes to job creation, foreign exchange earnings and national income escalation, improving semi-skill and skilled labor. Based on our knowledge, this paper is the first study attempting to investigate the effect of political stability on the FDI in Turkey using an econometric approach. Achieving this objective, a co-integration analysis was conducted between the FDI and its determinants in the short-run and long-run including “macroeconomic indicators” and “Political Stability (PS)” in Turkey. Using annual data from 1974 to 2017 via Auto-Regressive Distributed Lag (ARDL) model. The results confirm the positive correlation betwe

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Analsis of politic behavior and its impact on displaying the continuousness of organizational trust mantainance ,applied research of a sample of AL-farouq State Construction contracting company Employees
...Show More Authors

The research aims to know the concept of politic behavior as one of the important behaviours in the different fields and sectors. It is considered to be part of the organizatial work to face the expected  risks. It includes two group of factors personal (self –monitors, locus of control ,expectation s of success, perceived job alternatives)and organizational(promotion ,division resources,role  ambiguity ,democratic decision)studied by the researcher  in the frame of the relationship with the variable  of display  continuous trust matain which includes two variable (build trust mantain, display  trust continuouness)through applied frame by random sample consists of (90)employee  at Farouq State

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri Jun 11 2021
Journal Name
Journal Of Computing And Information Technology
A Survey on Emotion Recognition for Human Robot Interaction
...Show More Authors

With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (7)
Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref