Preferred Language
Articles
/
7xZvi4cBVTCNdQwCzlRX
Some new properties of soft Lc-spaces
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Modern Applied Science
New Combined Technique for Fingerprint Image Enhancement
...Show More Authors

This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one

... Show More
Publication Date
Wed Jul 17 2019
Journal Name
Advances In Intelligent Systems And Computing
A New Arabic Dataset for Emotion Recognition
...Show More Authors

In this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N

... Show More
View Publication
Scopus (15)
Crossref (7)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Bulletin Of Mathematics And Statistics Research
New Approximation Operators Using Mixed Degree Systems
...Show More Authors

This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Proposed Method For Web Services Security
...Show More Authors

TI1e Web service securi ty challenge is to understand  and  assess the risk  involved  in securing  a web-based  service  today, based on our existing security technology, and at the same time tmck emerging standards and  understand  how they will be used  to offset the risk in

new web services. Any  security model must  i llustrate  how data  can

now  through   an  application   and   network   topology  to  meet  the

requirements  defined  by the busi ness  wi thout exposing  the data  to undue  risk.  In this paper  we propose &n

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Experimental Study of Thermophysical Properties of TiO2 Nanofluid
...Show More Authors

Titanium-dioxide (TiO2) nanoparticles suspended in water, and ethanol based fluids have been prepared using one step method and characterized by scanning electron microscopy (SEM), and UV–visible spectrophotometer. The TiO2 nanoparticles were added to base fluids with different volume concentrations from 0.1% to1.5% by dispersing the synthesized nanoparticles in deionized water and ethanol solutions. The effective thermal conductivity, viscosity and pH of prepared nanofluids at different temperatures from 15 to 30 oC were carried out and investigated. It was observed that the thermal conductivity, pH, and viscosity of nanofluids increases with the increase in TiO2 nanoparticle volume fraction

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study of Nuclear Properties of High Purity Germanium
...Show More Authors

      In the current study, the observations depended on some nuclear properties of Germanium isotopes that are used for multiple purposes by studying transverse sections when interacting with charged particles such as alpha and proton particles and their interaction with gamma rays of conjugal isotopes relative to the stability of the nucleus with other nuclei. By calculating the cross sections of the  (α, )   ,  (γ,x)0-NN-1, (γ,2n)  , (α,p)  reactions of  isotope. Nuclear reactions in the newer global libraries (EXFOR, ENDF, JEF, JEFF, GENDL) have been published to identify appropriate energies in calculating the inverse nuclear re

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 21 2025
Journal Name
Imam Ja'afar Al-sadiq University Journal Of Legal Studies
The legal framework for the protection of new plant varieties
...Show More Authors

TRIPS agreement was The first to apply protection by patents. However, this type of protection, which grants exclusive and monopoly rights to patent owners, came at the expense of developing countries which are considered rich in biodiversity and also at the expense of traditional and poor knowledge of modern technologies. The release of new plant varieties has led to the emergence of biopiracy and looting of the rights of developing countries without a license

View Publication
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
The Victorian Society’s Fear of the New Woman in Bram
...Show More Authors

Nineteenth century Gothic literature was deeply concerned with the threats against masculinity. Perhaps one of the most important changes that happened at that time was the emergence of the New Woman model which posed a great threat against masculinity and the male role in the Victorian society. Bram Stoker’s Dracula (1897) portrays female characters who embody this transition in female roles from the domestic wife to the New Woman. This paper focuses on the female characters Mina Murray and Lucy Westenra, their roles in their society, and the different fates they face at the end of the novel, with special focus on Mina’s transformation to the model of the New Woman.

View Publication Preview PDF
Crossref
Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and antimicrobial evaluation of new 1,3,4 – Thiadiazole Derivatives
...Show More Authors

The amino thiadiazole [I] on treatment with aromatic aldehydes yielded Schiff bases [IIa-c] , which cyclized to thiazolidinone [IIIa-c] derivatives by reaction with thioglycolic acid .Reaction of carbon disulfide and methyl iodide with [I] gavedithiomethyl[IV] which on treatment with o-phenylenediamine gave the condensed N-Imidazolythiadiazolylamine [V] , However , reaction of [I] with phenylisocyanate and phenylisothiocyanate afforded the carbamideand carbothiamide derivatives[VI.VII]a-c. The structure of these compounds was characterized from their  melting point , FTIR spectroscopy and elementalanalysis

View Publication Preview PDF