Preferred Language
Articles
/
C0K4SJoBMeyNPGM39MDU
Reliable computational methods for solving Jeffery-Hamel flow problem based on polynomial function spaces
...Show More Authors

Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
University Of Baghdad, College Of Education For Pure Sciences / Ibn Al-haitham, Department Of Mathematics
Some Kinds of Fibrewise Totally Topological Spaces
...Show More Authors

In this thesis, we introduced some kinds of fibrewise topological spaces by using totally continuous function is called fibrewise totally topological spaces. We generalize some fundamental results from fibrewise topology into fibrewise totally topological spaces. We also introduce the concepts of fibrewise totally separation axioms, fibrewise totally compact and locally totally compact topological spaces. As well as fibrewise totally perfect topological spaces. We explain and discuss new notion of fibrewise topological spaces, namely fibrewise totally topological spaces. We, also introduce the concepts of fibrewise totally closed topological spaces, fibrewise totally open topological spaces, fibrewise locally sliceable and locally s

... Show More
Publication Date
Sat Jul 15 2023
Journal Name
Journal Of Interdisciplinary Mathematics
Some games via semi-generalized regular spaces
...Show More Authors

In this research, a new application has been developed for games by using the generalization of the separation axioms in topology, in particular regular, Sg-regular and SSg- regular spaces. The games under study consist of two players and the victory of the second player depends on the strategy and choice of the first player. Many regularity, Sg, SSg regularity theorems have been proven using this type of game, and many results and illustrative examples have been presented

View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Computer Sciences
Connectedness in Graphs and Gm-Closure Spaces
...Show More Authors

This paper is devoted to the discussion the relationships of connectedness between some types of graphs (resp. digraph) and Gm-closure spaces by using graph closure operators.

Preview PDF
Publication Date
Sun Jun 11 2017
Journal Name
Al-academy
Processors Functional Design In Public Interior Spaces
...Show More Authors

It is general known that any design in various fields such as the interior design in the field of spaces interior for the public and specific buildings that is concern about the use of humans resident , as well as other considerations relating to the organization of design elements and lines of locomotors activity and the validity of appropriate receiving to provide comfort and achieve the requirements of the position in the space of restaurants field of research.
The researcher choose the title of this study (processors design career in public spaces), the analytical study of the spaces of restaurants, as one of the public spaces that are running in their general environment of people in various strata , ages and other levels , whic

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 12 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Study the Effects of Anadrol Overdose on Liver Function in Male Rats
...Show More Authors

 

Anadrol (oxymetholone) is an active androgenic anabolic steroid that has been clinically studied in numerous diseases since the 1960s. It is used in the treatment of anemia and the replacement of male sex steroids. Unfortunately, in attempts to improve physical performance, Anadrol could be misused by athletes, that can lead to poisoning contributes to hepatotoxicity.

The aim of this study was to investigate the impact of anadrol on the liver function in rat model, via assessment of liver enzymes and histopathological study.

A forty male rats, weights about (200-300 gm), aged 8-12 weeks, after acclimatization, the rats were ‎randomly divided into four groups (10 rats in each group) as follow: control group (in w

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Brain Research Bulletin
A note on the probability distribution function of the surface electromyogram signal
...Show More Authors

View Publication
Scopus (86)
Crossref (89)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Different Methods for Estimating Location Parameter & Scale Parameter for Extreme Value Distribution
...Show More Authors

      In this study, different methods were used for estimating location parameter  and scale parameter for extreme value distribution, such as maximum likelihood estimation (MLE) , method of moment  estimation (ME),and approximation  estimators based on percentiles which is called white method in estimation, as the extreme value distribution is one of exponential distributions. Least squares estimation (OLS) was used, weighted least squares estimation (WLS), ridge regression estimation (Rig), and adjusted ridge regression estimation (ARig) were used. Two parameters for expected value to the percentile  as estimation for distribution f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Medical Image Compression using Wavelet Quadrants of Polynomial Prediction Coding & Bit Plane Slicing
...Show More Authors

Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Sat Jan 01 2011
Journal Name
Communications In Computer And Information Science
The Use of Biorthogonal Wavelet, 2D Polynomial and Quadtree to Compress Color Images
...Show More Authors

In this paper, a compression system with high synthetic architect is introduced, it is based on wavelet transform, polynomial representation and quadtree coding. The bio-orthogonal (tap 9/7) wavelet transform is used to decompose the image signal, and 2D polynomial representation is utilized to prune the existing high scale variation of image signal. Quantization with quadtree coding are followed by shift coding are applied to compress the detail band and the residue part of approximation subband. The test results indicate that the introduced system is simple and fast and it leads to better compression gain in comparison with the case of using first order polynomial approximation.

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref