Preferred Language
Articles
/
IhZIDIwBVTCNdQwCqvfe
USING A NEW METHOD TO INDUCE TARGETED GENETIC MUTATIONS IN POTATO VIRUS Y (PVY)
...Show More Authors

Scopus
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Test the effectiveness of Method EMDR
...Show More Authors

Our country faced lots of crises specially Wars and still living under the traumatic events. This would result in psychological disorder specially the Acute Stress Disorder (ASD). That’s if not treated, it will turn to be over Post Traumatic Stress Disorder(PTSD). Also not mentioning the shortage of recourses speaks about war and crises. That treat with its inflections psychologically and sociologically theses cases if happened.

The importance of this study arise through it is objective to introduce a program for EMDR which give benefit for treat in health, social, educational institutes.

Aims:

The objective of this Study is the identification of a Test the effectiveness of Eye Movement Desensi

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
Las formas no personales del verbo en español y su traducción al árabe Non-personal forms of the verb in Spanish and their translations into Arabic
...Show More Authors

Las formas verbales: el infinitivo, el gerundio y el participio, son derivados verbales que se comportan como sustantivos, adverbios o adjetivos, respectivamente; aunque, dado su carácter verbal pueden también funcionar como verbos y, por tanto, como núcleos del predicado.

 El presente trabajo presenta una visión general sobre las formas no personales del verbo en español. Se debe recordar que las formas no personales del verbo tiene funciones y valores dentro de la oración.

  Este trabajo lo dividimos  en dos partes: la primera presenta  un breve marco teórico en que se explica las formas no personales del verbo y como se forman además de sus funciones.

Abstract

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 13 2024
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Dispensing of Antimicrobial Agents Without a Prescription in Iraq: A Call for Upholding the Legislations to Change Long-Standing Practices
...Show More Authors

Background: Antimicrobial prescribing patterns have an important role in the emergence of resistance, and community pharmacists have a substantial influence on this issue. Objective: To assess community pharmacists' behaviors and attitudes toward antimicrobial dispensing, determine their proportions and categories, and examine the underlying rationales for this practice. Methods: A descriptive cross-sectional survey of community pharmacists in Iraq was conducted from June to August 2023, using a self-administered validated questionnaire. The attitudes, practices, and motivations driving the distribution of antimicrobials without a prescription (AWP) were explored in three areas. Results: A sizable proportion (61.6%) of respondents rejected

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Apr 21 2023
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees22fr
Modified x-ray analysis size strain plot method to determine the lattice stress and strain energy density of calcium titan oxide (CaTiO3) nanoparticles
...Show More Authors

In this research, the size strain plot method was used to estimate the particle size and lattice strain of CaTiO3 nanoparticles. The SSP method was developed to calculate new variables, namely stress, and strain energy, and the results were crystallite size (44.7181794 nm) lattice strain (0.001211), This method has been modified to calculate new variables such as stress and its value (184.3046308X10-3Mpa) and strain energy and its value (1.115833287X10-6 KJm-3).

View Publication
Scopus Crossref
Publication Date
Wed May 12 2021
Journal Name
Annals Of The Romanian Society For Cell Biology
Effect of the opposite hierarchical training method to developing explosive power, which is characterized by speed and some functional variables for basketball players
...Show More Authors

The current world seeks to supply the most of the fruits of human knowledge and tries hard to search for the most important scientific facts, programs, means and advanced devices in various fields, including the sports field, and among these means is the use of various and advanced training devices and programs for the purpose of achieving the desired goal, which is to reach the desired level, the basketball game is one of the sports that need high technology in training according to scientifically studied principles because it is one of the games that relate to the abundance of its variables, composition and speed of change, all of which require a technical and high training depth and the players ’possession of different physical charact

... Show More
View Publication
Publication Date
Sun Jan 01 2006
Journal Name
Journal Of The College Of Languages (jcl)
El realismo del personaje de Lazarillo de Tormes por el tratado primero "cuenta Lazaro su vida y cuyo hijo fue"
...Show More Authors

El Lázarillo señala a fines del reinado del emperador, el comienzo de un
nuevo género en la literatura castellana. A través de sus páginas nos adentró en un
mundo de pobreza, de
hambre secular, de hipocresía, y rodeado de problemas.
Lázaro cuenta en primera persona sus aventuras comenzando por su nacimiento, en
una aceña de las riberas del río Tormes. Condenando su padre como ladrón y, su
madre se entrega al mas vil morisco - cuya conducta deja también que desea –
haber pasado hambre y le entrega, siendo todavía un niño, a un ciego de alma ruin
para que, acompañándole, se gana la vida. Para aplacar el hambre, pues el ciego le
daba poco de comer, el muchacho le hace objeto, de repetidas tretas.

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF