Preferred Language
Articles
/
5hbcC4cBVTCNdQwCUDKD
Effect of sodium silicate on the unconfined compressive strength of sand dune
...Show More Authors
Abstract<p>Sand dunes are spread in multiple places in the world especially in a desert area as a result of economic development and construction processes, there was a need to study the behavior of sand dunes and make it suitable for construction. This paper aims to study the effect of adding sodium silicate on the cohesion strength of sand dune and its behavior. The results show that the cohesion strength increase as a percentage of sodium silicate increase (addition 8% Sodium silicate show the higher cohesion) and the cohesion between sand dune particles increase excepted when using 10% sodium silicate the cohesion began to decrease. However, the effect of curing time is significant and shows that as the curing time increases the cohesion strength of sand dune increases.</p>
Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 30 2018
Journal Name
Iop Conference Series: Materials Science And Engineering
Damage pattern scope prediction for well point dewatering on building foundations
...Show More Authors

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Fri Apr 30 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences (ihjpas)
Biochemical Study on Splenectomy and Non Splenectomy Iraqi Major Thalassemic Patients
...Show More Authors

Preview PDF
Publication Date
Tue Oct 08 2019
Journal Name
Asa-cssa-sssa International Annual Meeting
Cover Crop Effects on Soil Health in Organic High Tunnels (2019).
...Show More Authors

High tunnels, or unheated plastic greenhouses, are becoming increasingly popular among organic vegetable growers across the United States. However, the intensive production typical of these systems presents soil health challenges, including salinization due to high fertilizer or compost inputs coupled with lack of rainfall to leach salts. Legume cover crops may improve soil health in high tunnels by reducing the need for external inputs, while adding organic matter. We tested the soil health effects of a winter hairy vetch (Vicia villosa Roth) cover crop used to replace fertilizer N in an organic tomato cropping system in high tunnels. Studies were replicated across three sites differing in climate and soil type (Kansas, Kentucky, and Minne

... Show More
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Jordan generalized Γ- (σ,τ) -Derivation on Prime Γ-Near Rings
...Show More Authors

      In this paper, we introduce the notion of Jordan generalized Derivation on prime and then some related concepts are discussed. We also verify that every Jordan generalized Derivation is generalized Derivation when  is a 2-torsionfree prime .

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 24 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
On strongly E-convex sets and strongly E-convex cone sets
...Show More Authors

              -convex sets and -convex functions, which are considered as an important class of generalized convex sets and convex functions, have been introduced and studied by Youness [5] and other researchers. This class has recently extended, by Youness, to strongly -convex sets and strongly -convex functions. In these generalized classes, the definitions of the classical convex sets and convex functions are relaxed and introduced with respect to a mapping . In this paper, new properties of strongly -convex sets are presented. We define strongly -convex hull, strongly -convex cone, and strongly -convex cone hull and we proof some of their properties.  Some examples to illustrate the aforementioned concepts and to cl

... Show More
View Publication
Crossref
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
Some Results On Lie Ideals With (&#963;,&#964;)-derivationIn Prime Rings
...Show More Authors

In this paper, we proved that if R is a prime ring, U be a nonzero Lie ideal of R , d be a nonzero (?,?)-derivation of R. Then if Ua?Z(R) (or aU?Z(R)) for a?R, then either or U is commutative Also, we assumed that Uis a ring to prove that: (i) If Ua?Z(R) (or aU?Z(R)) for a?R, then either a=0 or U is commutative. (ii) If ad(U)=0 (or d(U)a=0) for a?R, then either a=0 or U is commutative. (iii) If d is a homomorphism on U such that ad(U) ?Z(R)(or d(U)a?Z(R), then a=0 or U is commutative.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Auto Crop and Recognition for Document Detection Based on its Contents
...Show More Authors

An Auto Crop method is used for detection and extraction signature, logo and stamp from the document image. This method improves the performance of security system based on signature, logo and stamp images as well as it is extracted images from the original document image and keeping the content information of cropped images. An Auto Crop method reduces the time cost associated with document contents recognition. This method consists of preprocessing, feature extraction and classification. The HSL color space is used to extract color features from cropped image. The k-Nearest Neighbors (KNN) classifier is used for classification. 

View Publication Preview PDF
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
Supra Rough Membership Relations and Supra Fuzzy Digraphs on Related Topologies
...Show More Authors

The primary aim of this paper is to present two various standpoints to define generalized membership relations, and state the implication between them, in order to categorize the digraphs and assist for their gauge exactness and roughness. In addition, we define several kinds of fuzzy digraphs.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref