Preferred Language
Articles
/
IhbfQIcBVTCNdQwCPD6T
Artificial Intelligence in Smart Agriculture: Modified Evolutionary Optimization Approach for Plant Disease Identification
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Suggestion Plan for the Reclassification of U.N Publications in Central Library
...Show More Authors

Suggestion Plan for the Reclassification of U.N Publications in Central Library

View Publication Preview PDF
Publication Date
Thu Apr 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Morphological Characters Study For Satureja L. Species ( Labiatae)in Iraq
...Show More Authors

    The morphological characters of   Satureja L.  species which is grown in Iraq were studied in detail ,starting from root,stem,leaves ,inflorescences ,flowers and fruits .The current study revelid that the characters of calyx and corolla have great important taxonomically ,besides the variations in the shape and size of leaves and bract ,figures were drawen  ,schedules and plates have been prepared.The indumentums study showed  that the trichomes have important taxonomically value of both glandular and eglandular hairs.

View Publication Preview PDF
Publication Date
Tue Dec 31 2024
Journal Name
Journal Of Emergency Medicine, Trauma And Acute Care
Histological variety analysis for pleomorphic adenoma in salivary glands: Retrospective study
...Show More Authors

Pleomorphic adenoma (PA) is the most frequent benign epithelial neoplasm of salivary glands, displaying a remarkable degree of morphological variety. The aim of the study is to illustrate the clinicopathological characteristics of PA with particular emphases on epithelial cell morphology and mesenchymal elements. Materials and Methods: A total of 132 PA collected between 2002 and 2017 were recruited from Al Shahid Ghazi Al Hariri Hospital and the Department of Oral Pathology, College of Dentistry, Baghdad University, Baghdad, Iraq, and analyzed for their demographic and histopathological features. All data were analyzed using descriptive statistics. A slightly higher incidence of PA was detected in females (52.3%) compared to male subject

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Science
3D Geological Modelling for Asmari Reservoir In Abu Ghirab Oil Field
...Show More Authors

    Building a geological model is an essential and primary step for studying the reservoir’s hydrocarbon content and future performance. A three-dimensional geological model of the Asmari reservoir in Abu- Ghirab oil field including structure, stratigraphy, and reservoir petrophysical properties, has been constructed in the present work. As to underlying Formations, striking slip faults developed at the flank and interlayer normal. Abu Ghirab oilfields are located on the eastern anticlinal band, which has steadily plunged southward. 3D seismic interpretation results are utilized to build the fault model for 43 faults of the Asmari Formation in Abu Ghirab Oilfield. A geographic facies model with six different rock facies types

... Show More
Crossref (2)
Crossref
Publication Date
Sun Dec 02 2018
Journal Name
Journal Of The College Of Education For Women
Features of (Possible for Itself) in the (Alashaira) opinion – Spoken Study
...Show More Authors

My study here is about the (possible for itself) features especially in the (Alashaira) opinion, also I touch to the other logicians opinions, I clarified these features concisely in the preface to be clear in front of the reader, I made it in two studies and five subjects.I talked about the meaning of the existence in the ((possible for itself) theme, and I clarified its types in the logicians and the philosophers' opinions, through which the existence and the nonexistence are equal in it, as it cannot be existed nor be nonsexist unless with a separated reason, and there is no necessity to oblige its existence, or its nonexistence is impossible.Then I talked about the outweighing of the (possible for itself) as one side  of the exi

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 08 2016
Journal Name
Methods In Molecular Biology
Production of Adjuvant-Loaded Biodegradable Particles for Use in Cancer Vaccines
...Show More Authors

View Publication
Scopus (9)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Mar 31 2022
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Geological Modeling and Resource Estimation for Mishrif Formation in Nasiriyah Oilfield
...Show More Authors

Resource estimation is an essential part of reservoir evaluation and development planning which highly affects the decision-making process. The available conventional logs for 30 wells in Nasiriyah oilfield were used in this study to model the petrophysical properties of the reservoir and produce a 3D static geological reservoir model that mimics petrophysical properties distribution to estimate the stock tank oil originally in place (STOOIP) for Mishrif reservoir by volumetric method. Computer processed porosity and water saturation and a structural 2D map were utilized to construct the model which was discretized by 537840 grid blocks. These properties were distributed in 3D Space using sequential Gaussian simulation and the variation in

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 20 2018
Journal Name
Al-academy
Directed by Treatment for single-place events in the cinematographic medium
...Show More Authors

The cinematographer mediates through the means of cinema and television a set of elements complementing each other in the light of developments in various sciences, culture and arts for the purpose of conveying the meaning to the recipient and achieve aesthetic taste. Despite the diversity of cinematographic media with its multiple forms, The researcher started from the principle of definition and knowledge of a technical phenomenon that emerged in the cinematographic medium through the treatment of dramatic events through the solutions of the exit line depends on the narrative of events in one place contributes to attract Mam spectator since this interesting phenomenon in the mediator, there .van question arises the adoption of that vis

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF