Preferred Language
Articles
/
ARgNx5QBVTCNdQwCiSCl
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Sep 20 2007
Journal Name
Journal Of Physical Education
The effect of high-intensity interval training (using weights) during the special preparation period on functional variables among junior basketball players
...Show More Authors

This study is concerned with the comparison of the results of some tests of passing and dribbling of the basketball of tow different years between teams of chosen young players in Baghdad. Calculative methods were used namely (Arithmetic mean, Value digression and T.test for incompatible specimens). After careful calculative treatments, it has been that there were abstract or no abstract differences in the find results of chestpass, highdribble and cross-over dribble. The clubs were: (Al-Khark, Air defence, Police and Al-Adamiyah) each one separate from the other for the year (2000-2001). After all that many findings were reached such as the lack of objective valuation (periodical tests) between one sport season and the other. In the light

... Show More
Preview PDF
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
Preparation, Characterization and Spectroscopic Study of New Tridentate Schiff Base and its Cu(II), Ni(II) and Zn(II) Metal Complexes
...Show More Authors

A new tridentate ligand has been synthesized derived from phenyl(pyridin-3-yl)methanone. Three coordinated metal complexes were prepared by complexation of the new ligand with Cu(II), Ni(II) and Zn(II) metal salts. The new Schiff base “benzyl -2-[phenyl(pyridin-3-yl)methylidene]hydrazinecarbodithioate” and the new metal complexes were characterized using various physico-chemical and spectroscopic techniques. From the analysis results, the expected structure to the metal complexes are octahedral in geometry for Cu(II) complex, square planner for Ni(II) and tetrahedral for Zn(II) complex. The new compounds are expected to show strong bioactivity against bacteria and cancer cells.

View Publication Preview PDF
Crossref
Publication Date
Mon Aug 26 2019
Journal Name
Global Proceedings Repository American Research Foundation
Preparation, Spectra and Biological Properties of Transition Metals ((III) and (II) Mixed - Ligand Complexes with 5-Chlorosalicylic Acid and L-Valine
...Show More Authors

Mixed ligand metal complexes of CrIII, FeIII,II, NiII and CuII have been synthesized using 5-chlorosalicylic acid (5-CSA) as a primary ligand and L-Valine (L-Val) as secondary ligand. The metal complexes have been characterized by elemental analysis, electrical conductance, magnetic susceptibility measurements and spectral studies. The electrical conductance studies of the complexes indicate their electrolytic nature. Magnetic susceptibility measurements revealed paramagnetic nature of the all complexes. Bonding of the metal ion through –OHand –COOgroups of bidentate to the 5-chlorosalicylic acid and through –NH2 and –COOgroups of bidentate to the L-valine by FT-IR studies . The agar diffusion method has been used to study the antib

... Show More
Publication Date
Thu Oct 02 2025
Journal Name
Iraq Journal Of Market Research And Consumer Protection
Study of the qualitative characteristics of oils derived from fish waste running Asian Silurus triostequs and use of organic solvents in certain food systems
...Show More Authors

View Publication
Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
The problem and its manifestations with the modernists through the Iberissian systems in modern terminology (applied study): (Applied study)
...Show More Authors

Islamic law has relied on a number of sources in order to denote the rulings issued by them, including what is original and what is sub, and it is known to all scholars, that the Prophet's Sunnah is the second major source after the Koran, which separated the overall and devoted its year and restricted absolute. God Almighty obeyed the owner and his followers, and that his obedience of obedience to God Almighty said: (Who obeys the messenger has obeyed God) (women: 80), and then between the peasant who believes in him and his victory and follow him, he said: (and he said: And the one who was revealed with them were the successful ones (al-A'raf: 157).
     It is known that the Sunnah commanded to follow is the

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Al-nahrain University Science
Breaking Knapsack Cipher Using Population Based Incremental Learning
...Show More Authors

View Publication
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Sun Oct 01 2017
Journal Name
2017 47th European Microwave Conference (eumc)
A semiconductor based millimeter-wave waveguide junction circulator
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Improve topic modeling algorithms based on Twitter hashtags
...Show More Authors
Abstract<p>Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned</p> ... Show More
View Publication
Scopus (19)
Crossref (17)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More