Preferred Language
Articles
/
WRdZro0BVTCNdQwCcBgT
Combining Arabic Nested Noun Compound and Collocation Extraction Using Linguistic and Statistical Approach
...Show More Authors

Crossref
View Publication
Publication Date
Wed Jul 22 2020
Journal Name
International Journal Of Research In Pharmaceutical Sciences
Cloud point extraction method for the sensitive determination of metoclopramide hydrochloride in pharmaceutical dosage forms
...Show More Authors

In this work, a simple and very sensitive cloud point extraction (CPE) process was developed for the determination of trace amount of metoclopramide hydrochloride (MTH) in pharmaceutical dosage forms. The method is based on the extraction of the azo-dye results from the coupling reaction of diazotized MTH with p-coumaric acid (p-CA) using nonionic surfactant (Triton X114). The extracted azo-dye in the surfactant rich phase was dissolved in ethanol and detected spectrophotometrically at λmax 480 nm. The reaction was studied using both batch and CPE methods (with and without extraction) and a simple comparison between the two methods was performed. The conditions that may be affected by the extraction process and the sensitivity of m

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue Oct 07 2003
Journal Name
University Of Baghdad
A STUDY ON SOLVENT EXTRACTION OF HOLMIUM (III) WITH SUDAN BLACK B REAGENT (M.Sc. Thesis)
...Show More Authors

Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Al-academy
the diversity of the extraction methods of calligraphic straps at Baghdad's mosques: جواد كاظم حداوي
...Show More Authors

The art of calligraphy is regarded as one of the tremendous and distinct products in the history of Islamic arts through the unparalleled high ranks it reached to, until it gained Islam's indication and became a symbol for it, in terms of its function linked to the calligraphy of the holy Qur'anic texts, where this merit formed a strong impulse in seeking its development, the emergence of the calligraphic constructs, including the calligraphic straps, is one of this continual seeking products, and an advanced stage at the level of technical and expressive development, and also one of the natural results generated by the development of fonts and the increase of their employing methods through what they recorded at the level of formal char

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Ieee Transactions On Human-machine Systems
Myoelectric Control With Fixed Convolution-Based Time-Domain Feature Extraction: Exploring the Spatio–Temporal Interaction
...Show More Authors

View Publication
Scopus (27)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Aug 19 2025
Journal Name
Journal Of Physical Education
The impact of proposed approach for flexibility and agility in learning some basic skills on the table land movements in the artistic gymnastics
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
The Psychometric Properties of the Arabic Version of Nomophobia Scale among Omani Youth
...Show More Authors

The current research aimed to investigate the psychometric characteristics of the Arabic version of the Nomophobia scale for the Omani youth. The scale was administered to a random sample of students from public and private universities and colleges in Oman. The research sample consisted of 2507 students, of whom 868 males and 1639 females. The validity of the measure was first checked by presenting the scale to a group of experts in this field. Then the exploratory and confirmatory factor analysis was carried out. The exploratory factor analysis revealed the existence of three main factors: the fear of connectivity loss, the fear of communication loss with others, and the fear of network outages. These factors accounted for 65.6% of the

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 14 2023
Journal Name
Res Militaris
The Familiarity of Preparatory Stage Arabic Language Teachers of Higher-Order Thinking Skills
...Show More Authors

The study aimed to find out the degree of practicing Arabic language teachers in the preparatory stage of higher-order thinking skills from their point of view in the first, second and third Baghdad Rusafa directorates of education. The descriptive survey method was used. The study population consisted of teachers of the Arabic language in the directorates of Baghdad, Rusafa, First, Second and Third, and the sample number was (284) teachers. A questionnaire was built on higher-order thinking skills. The validity and reliability of the tool were verified, after which the scale was applied to the research sample of (116) schools and (168) teachers who were randomly selected from the schools affiliated to the Baghdad Education Directorates Rus

... Show More
View Publication Preview PDF
Publication Date
Wed May 18 2016
Journal Name
Al-academy
Formal Diversity In The Structure Design Arabic Magazine Covers: نور أحمد حاجم الربيعي
...Show More Authors

The magazine is one of the print media , which represents an important gateway to the wider world , due for its intellectual and cultural fun for the recipient affecting the everyday needs him in various directions . The cover of the magazine is the owner of appearance and impact of the first look the magazine , including the magnitude of the value of the functional and aesthetic pay the reader to the acquisition, as it seeks designed to attract the receiver and achieve better grades optical communication enabled this diversity vocabulary construction for the cover of the magazine and consistent with the idea of design .Ensure Current search four chapters , first chapter of which , the research problem and was questioning following what

... Show More
View Publication Preview PDF
Crossref