Preferred Language
Articles
/
NRYJRocBVTCNdQwCMUAw
Morphometric Analysis of the Mental Foramen Variation in an Iraqi Population by Using Cone-Beam Computed Tomography
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The difference of distribution of labor force according to the economic activity of the population of Missan province
...Show More Authors

The study showed a significant rise in the proportion of the labor force in agriculture
activity among the detailed economic activities in 1997 with a rate (%28.9), and then
decreased to (%18.8) in 2011, and this belong to the deterioration of agriculture and the
transition to the other economic activities.
2- The highest percentage of male's participation in year 1997 obtained by the activity (A),
which is represented by agriculture , where was (%30.0) while the highest percentage of
female's participation has been brought by the activity (M) which is represented education
with a rate (% 47.9). while in 2011 that the highest proportion of males' concentration
obtained by the activity (L) with a rate (%23.1) while

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Simulation and Modeling of Detailed Load flow Analysis for the 400kVA and 132kVA Iraqi Grid
...Show More Authors

A load flow program is developed using MATLAB and based on the Newton–Raphson method,which shows very fast and efficient rate of convergence as well as computationally the proposed method is very efficient and it requires less computer memory through the use of sparsing method and other methods in programming to accelerate the run speed to be near the real time.
The designed program computes the voltage magnitudes and phase angles at each bus of the network under steady–state operating conditions. It also computes the power flow and power losses for all equipment, including transformers and transmission lines taking into consideration the effects of off–nominal, tap and phase shift transformers, generators, shunt capacitors, sh

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
Investigation of the Porosity of Certain Iraqi Clay Deposits by Mercury Porosimeter
...Show More Authors

Pore volume, pore diameter, and pore volume distribution of three of Iraqi natural clay deposites were measured using mercury intrusion porosimetry .The clays are white kaolin, colored kaolin, and bentonite .The results showed that the variation of the pore area of the clay deposites followed the following order :- Coloured Kaolin > White Kaolin > Bentonite While the pore volume may be arranged as in the following sequence:- White Kaolin > Coloured Kaolin >Bentonite Also , Bentonite exhibits the narrow range pore size distribution than the white and coloured kaolin.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering Science And Technology
The feasibility of using styrene-butadiene-styrene (SBS) as modifier in Iraqi bituminous binder
...Show More Authors

The increase in the number of trucks and other heavy vehicles in Iraqi highways lead to cracking and deteriorations in the flexible highway. The use of polymermodified asphalt may solve this problem to match the required performance standards. This study investigates the effects of styrene-butadiene-styrene (SBS) polymer on the performance behaviour of Iraqi bitumen binder. The characteristics of bitumen binder were analysed to observe the compatibility of bitumen with SBS polymer. The bitumen binder was mixed with three different contents of SBS (4%, 4.5%, and 5%) by weight of asphalt cement. Viscosity tests were conducted on the SBS polymer-modified asphalt at 135 oC and 165 oC in addition to conventional binder tests. The prepar

... Show More
Scopus (9)
Scopus
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
The Writer Authentication by Using Syllables Frequency
...Show More Authors

An approach is depended in the recent years to distinguish any author or writer from other by analyzing his writings or essays. This is done by analyzing the syllables of writings of an author. The syllable is composed of two letters; therefore the words of the writing are fragmented to syllables and extract the most frequency syllables to become trait of that author. The research work depend on analyzed the frequency syllables in two cases, the first, when there is a space between the words, the second, when these spaces are ignored. The results is obtained from a program which scan the syllables in the text file, the performance is best in the first case since the sequence of the selected syllables is higher than the same syllables in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Financial technology as one of the recovery strategies of the Iraqi banking sector in the post-Covid-19 stage: An exploratory study
...Show More Authors

The research aims to employ one of the most important strategies for recovery from the crisis of the Covid-19 pandemic, which ravaged the economies of the entire world and its various sectors, including the banking sector, through financial technology that is based on digital transformation to achieve financial sustainability and the creation of innovative financial value chains in light of the decline in the banking sector as a result of The negative effects of the Covid-19 pandemic, be guided by the relevant international accounting standards to control the risks associated with financial technology. To recover from the Covid-19 crisis, the research came out with a set of recommendations, most notably financial technology from

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Diagnostic Approach of Atypical Cells in Effusion Cytology Using Computerized Image Analysis
...Show More Authors

Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
مجلة المستنصرية للعلوم والتربية
Calculation of Electron Drift Velocity in Xenon Gas Using Boltzmann Equation Analysis
...Show More Authors

Publication Date
Wed Aug 16 2023
Journal Name
مجلة الاستاذ للعلوم الانسانية والاجتماعية- كلية التربية ابن رشد – جامعة بغداد،
Using the Theory of Conceptual Metaphor in Two Sonnets by Victorian Female Poets
...Show More Authors

This study has applied the theoretical framework of conceptual metaphor theory to the analysis of the source and target domains of metaphors that are used in two English nineteenth century sonnets, both written by contemporaneous female poets. The quantitative and qualitative results of the textual analysis have clearly revealed that Elizabeth Barrett Browning’s sonnet 23 centres around the conceptual mapping of the journey of love and life with that of possession. In contrast, Christina Rossetti’s sonnet Remember tackles the central conceptual mapping of death as a journey in relation to its further experiential connections. In addition, the application of conceptual metaphor theory in identifying the frequencies and densities of metap

... Show More