Preferred Language
Articles
/
ThYhmIoBVTCNdQwCHaDj
Stability analysis of a competitive ecological system in a polluted environment
...Show More Authors

The interplay of species in a polluted environment is one of the most critical aspects of the ecosystem. This paper explores the dynamics of the two-species Lokta–Volterra competition model. According to the type I functional response, one species is affected by environmental pollution. Whilst the other degrades the toxin according to the type II functional response. All equilibrium points of the system are located, with their local and global stability being assessed. A numerical simulation examination is carried out to confirm the theoretical results. These results illustrate that competition and pollution can significantly change the coexistence and extinction of each species.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Study of Stability of Personal Dosimeter
...Show More Authors

The study is carried out by using personal dosimeters (film badge). The films are irradiated to absorbed dose of range (0.01-10000 rad). The calibration curves are drawn by using the ordinary method taking into account the filtration effects in three regions (D (Pb/Sn),D(Du),D(300). The calibration films are stored in ambient condition. It is found that the optical density increases, which is attributed to the photodegradation of the films may induce localized states in the energy gap causing increasing in optical absorption, but optical density decreases, which attributed to the photodegradation of the films may cause some cracks at the film surface during the first month, whereas at the rest months we see clear stability in optical d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Responsible accounting and its role in achieving competitive advantage
...Show More Authors

One of the management accounting tools is responsible accounting. In this system, the organisation is divided into responsibility centres that help to connect an individual performance responsible to perform through a combined system of reports according to the implementation of the mechanism of exception tools which gives assistance in planning. The exploitation of the organisation's available resources is achieved through the application of responsible accounting. Also, the best exploitation will lead to the provision of low-cost products through the disposal of all types of waste or loss during the cost centres. By providing products at a lower cost and satisfying the wishes of the needs of customers, the result reflects the competitive

... Show More
Scopus
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Geological Journal
A Review on Pressure Transient Analysis in Multilayer Reservoir: South Iraq Case Study
...Show More Authors

Multilayer reservoirs are currently modeled as a single zone system by averaging the reservoir parameters associated with each reservoir zone. However, this type of modeling is rarely accurate because a single zone system does not account for the fact that each zone's pressure decreases independently. Pressure drop for each zone has an effect on the total output and would result in inter-flow and the premature depletion of one of the zones. Understanding reservoir performance requires a precise estimation of each layer's permeability and skin factor. The Multilayer Transient Analysis is a well-testing technique designed to determine formation properties in more than one layer, and its effectiveness over the past two decades has been

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Theory And Practice In Language Studies
Constructing Carcinogen Risk in Scientific Discourse Through Ideological Conflict: A Cognitive Pragmatic Analysis
...Show More Authors

With the increasing rates of cancer worldwide, a great deal of scientific discourse is devoted to arguments and statements about cancer and its causes. Scientists from different fields try to seize any available chance to warn people of the risk of consuming and exposing to carcinogens that have, unfortunately, become essential parts of modern life. The present paper attempts to investigate the proximization strategy through which scientists construct carcinogen risk to enhance people’s preventive actions against these carcinogens. The paper targets the construction which depends on producing the conflict between the values of the people themselves and the contrasting values assigned to carcinogens. To achieve this aim, Cap’s (2

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
Women's Rape in Iraq between Legislation and Social Norms: A Critical Discourse Analysis
...Show More Authors

Recently, women's rape has been a pervasive problem in the Iraqi society. Thus, it has become necessary to consider the role of language and its influence on the common beliefs and opinions about rape in the Iraqi society. Thus, taking into consideration the critical role of language and its impact on the perception of human reality and the social development based on people's beliefs and principles of life has become highly indispensable. Therefore. The aim of this article is to address this problem critically from legislation and social norms in NGOs' reports (2015; 2019) with reference to some provisions from the Iraqi Panel Code (1969; 2010). Therefore, the researchers examine the discursive strategies and ideological viewpoints in t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
A Mathematical Model of a Thermally Activated Roof (TAR) Cooling System Using a Simplified RC-Thermal Model with Time Dependent Supply Water Temperature
...Show More Authors

This paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF