Preferred Language
Articles
/
2obsrYYBIXToZYALS6N-
Multi Response Optimization of Submerged Arc Welding Using Taguchi Fuzzy Logic Based on Utility Theory
...Show More Authors

Crossref
Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Al-khwarizmi Engineering Journal
BER Performance Improvement of Dual Chaotic Maps Based on STBC Communication System
...Show More Authors

Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Cytokine
Immune response to colonization of Candida albicans in mice treated with Cefoperazone
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jan 02 2025
Journal Name
Journal Of The College Of Languages
Transformation of Slogans and Stereotypes in Response to Shifts in Political Discourse
...Show More Authors

This study examines the transformation of political slogans, clichés, and stereotypes in Russia and Iraq during periods of political regime change in the late 20th and early 21st centuries. The main objective of the work is to identify and comparatively analyze the linguistic and cultural changes that accompanied political transformations in both countries. The research is based on theoretical concepts of political myth, framing, and critical discourse analysis. The research methodology includes content analysis of political texts, comparative analysis of linguistic transformations, and analysis of statistical data on cultural consumption. The main hypothesis is that, despite the presence of common trends in linguistic and cultural

... Show More
View Publication
Crossref
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Classroom Teachers’ Perceptions of Response to Intervention Implementation: a Qualitative Interview Study
...Show More Authors

The purpose of this interview study was to explore teachers’ perceptions of Response to Intervention (RtI) implementation in their school. Particularly, the study explored teachers’ knowledge of RtI, teachers’ perceptions of RtI their intervention/instruction in school, and teachers’ suggestions of RtI implementation in their school. The study design was a qualitative interview in nature and data were collected from face-to-face interviews with four teachers in one school. The findings revealed that RtI means to identify students’ problems; the positive teachers’ perceptions of their implementation included: (a) students who demonstrate progress through RtI are those who receive private education services, (b) progress monito

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Communicable Diseases
Immune Response among Different Types of SARS-CoV-2 Vaccines in Iraq
...Show More Authors

Introduction: COVID-19 vaccine have been indicated to successfully decrease the hazard for symptomatic severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) infection furthermore associated hospitalisations. Objective: To study the immune response among different types of SARS-CoV-2 vaccines. Methods: This study includes 100 vaccinated individuals (43 Sinopharm, 30 AstraZeneca and 27 Pfizer) with one or two doses from different health centres in Baghdad. During the period from April 2021 to the end of May 2021, SARS-CoV-2 IgG and SARS-CoV-2 IgM levels were detected using AFIAS-6 device depending on FIA (Fluorescence Immunoassay) technique. Results: 93% of the cases were positive for IgG levels, and negative in 7% case

... Show More
View Publication Preview PDF
Scopus (7)
Scopus Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Therapeutic Response of Serum Lipids to Atorvastatin in Type II Diabetic Patients
...Show More Authors

Lipid disorders and cardiovascular disease (CVD) risk are known to be increased in patients with diabetes mellitus. The effects of statins on serum lipid levels are well known; however, previous studies did not compare the effects of statins on serum lipid levels in diabetic patients with non-diabetic patients. To investigate the effects of Atorvastatin on serum lipid profiles in hyperlipidemic patients with type 2 diabetes mellitus in comparison with hyperlipidemic patients without diabetes.This study was conducted on 33 type 2 diabetic patients & 34 non-diabetic patients; their age range was 40-80 years, all of them were hyperlipidemic, who had been administered 10, 20, & 40 mg daily of Atorvastatin and completed a 6-month foll

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 28 2018
Journal Name
International Journal Of Engineering & Technology
Finite Element Analysis for The Response of URM Walls Supporting RC Slab
...Show More Authors

The aim for this research is to investigate the effect of inclusion of crack incidence into the 2D numerical model of the masonry units and bonding mortar on the behavior of unreinforced masonry walls supporting a loaded reinforced concrete slab. The finite element method was implemented for the modeling and analysis of unreinforced masonry walls. In this paper, ABAQUS, FE software with implicit solver was used to model and analyze unreinforced masonry walls which are subjected to a vertical load. Detailed Micro Modeling technique was used to model the masonry units, mortar and unit-mortar interface separately. It was found that considering potential pure tensional cracks located vertically in the middle of the mortar and units show

... Show More
Crossref (1)
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
An efficient multistage CBIR based on Squared Krawtchouk-Tchebichef polynomials
...Show More Authors
Abstract<p>Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p</p> ... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Wed Apr 20 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Text image secret sharing with hiding based on color feature
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref