Preferred Language
Articles
/
Pxd5V5IBVTCNdQwCx6wl
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 11 2017
Journal Name
Al-academy
The Theory of knowledge And Their Repercussions On the Journalistic Image In Electronic Designs Websites
...Show More Authors

represent websites link support of human communicate and cohesion of cultures different depending on their languages and their environments around, it was the evolution of one of the most important means of communication of services for electronic networks, the Internet active role in containing the world Bbodqh science and knowledge to Taatlaqah cultures from which derives its intellectual and cognitive cupboards continuity and as a link language for each those environmental Altdadat, linguistic, religious, political, economic . We all know that these electronic means difficult promise ring intellectual and mental connectivity for the masses polarized without being of the image as an element Kravekaa supporter of the electronic media an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon Aug 31 2015
Journal Name
Ibn Al-haitham Jour.for Pure & Appl.sci.
Isolation and Partial Purifiction of Arginase from Sera of Women with Uterine Fibroids
...Show More Authors

The first aim of the present study was performed to assay the activity of arginase in sera of women with uterine fibroid.. This study consisted of(50) women with uterine fibroid as patient's group and (30) healthy women as control group. The age ranged between (30-55) years for the two groups. The results showed that highly significant increase (P< 0.0001) in the arginase activity in sera of women with uterine fibroid (7.99± 0.23) I.U/L is found when compared with healthy group (0.52±0.02) I.U/L. The second aim was performed to isolate arginase from sera of women with uterine fibroids. The purification is done by addition of ammonium sulfate, dialysis, gel filtration chromatography by using sephadex G-50 and ion exchange chromatography

... Show More
Publication Date
Thu Mar 16 2017
Journal Name
Ibn Al-haitham J. For Pure & Appl. Sci.
Isolation and Partial Purifiction of Arginase from Sera of Women with Uterine Fibroids
...Show More Authors

The first aim of the present study was performed to assay the activity of arginase in sera of women with uterine fibroid.. This study consisted of(50) women with uterine fibroid as patient's group and (30) healthy women as control group. The age ranged between (30-55) years for the two groups. The results showed that highly significant increas (P< 0.0001) in the arginase activity in sera of women with uterine fibroid (7.99± 0.23) I.U/L is found when compared with healthy group (0.52±0.02) I.U/L. The second aim was performed to isolate arginase from sera of women with uterine fibroids. The purification is done by addition of ammonium sulfate, dialysis, gel filtration chromatography by using sephadex G-50 and ion exchange chromatography by

... Show More
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Local and Global Uniqueness Theorems of the N-th Order Partial Differential Equations
...Show More Authors

In this paper, we consider inequalities in which the function is an element of n-th partially order space. Local and Global uniqueness theorem of solutions of the n-the order Partial differential equation Obtained which are applications of Gronwall's inequalities.

View Publication Preview PDF
Crossref
Publication Date
Wed May 11 2011
Journal Name
Tikrit Journal Of Pure Science
Isolation and partial purification malatase isoenzymes from urine of type 2 diabetic patients
...Show More Authors

This study was performd on 50 urine specimens of patients with type 2 diabetes, in addition, 50 normal specimens were investigated as control group. The activity rate of maltase in patients (6.40±2.17) I.U/ml and activity rate of maltase in normal (0.44±0.20)I.U/ml. The results of the study reveal that maltase activity of type 2 diabetes patient's urine shows significant increase (P<0.01) compare to normal.

Publication Date
Sat Mar 30 2024
Journal Name
Journal Of Kufa For Mathematics And Computer
Approximate Solution of Linear and Nonlinear Partial Differential Equations Using Picard’s Iterative Method
...Show More Authors

Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
mathematical model for segmentation of the overall planning of puplic redemption company- ministry of industry and minerals
...Show More Authors

Abstract

The study presents a mathematical model with a disaggregating approach to the problem of production planning of a fida Company; which belongs to the ministry of Industry. The study considers disaggregating the entire production into 3 productive families of (hydraulic cylinders, Aldblatt (dampers), connections hydraulics with each holds similar characteristics in terms of the installation cost, production time and stock cost. The Consequences are an ultimate use of the available production capacity as well as meeting the requirements of these families at a minimal cost using linear programming. Moreover, the study considers developing a Master production schedule that drives detailed material and production requi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Engineering
A Comparative Study of Various Intelligent Optimization Algorithms Based on Path Planning and Neural Controller for Mobile Robot
...Show More Authors

In this paper, a cognitive system based on a nonlinear neural controller and intelligent algorithm that will guide an autonomous mobile robot during continuous path-tracking and navigate over solid obstacles with avoidance was proposed. The goal of the proposed structure is to plan and track the reference path equation for the autonomous mobile robot in the mining environment to avoid the obstacles and reach to the target position by using intelligent optimization algorithms. Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithms are used to finding the solutions of the mobile robot navigation problems in the mine by searching the optimal paths and finding the reference path equation of the optimal

... Show More
View Publication Preview PDF
Crossref (3)
Crossref