Preferred Language
Articles
/
XRjHzpcBVTCNdQwCz52T
Ventral penile papillae as a new anatomical structure: a clinical-epidemiological study among Iraqi males
...Show More Authors

S Khalifa E, AR Jamal R, N Adil A, J Munqithe M…, 2009

View Publication
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Constructing a new mixed probability distribution with fuzzy reliability estimation
...Show More Authors

This paper deals with constructing mixed probability distribution from mixing exponential

Scopus (6)
Scopus
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
A New Operational Matrix of Derivative for Orthonormal Bernstein Polynomial's
...Show More Authors

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
A new vision for the classic in contemporary fashion designResearch
...Show More Authors

        fashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages      The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Sep 15 2019
Journal Name
Journal Of Global Pharma Technology
Effect of Citric Acid Application on Anatomical and Physiological Properties of the Vegetative Parts of a Species of Tamarindus Indica Cultivated in Iraq
...Show More Authors

Publication Date
Wed Jun 09 2021
Journal Name
Annals Of The Romanian Society For Cell Biology
The Effect of Brassinolide Application in the Anatomical and Physiological Characteristics of the Vegetative Parts of a Species from the Genous of Brassciaaleraceacabbage …
...Show More Authors

The current study included details of the anatomical characteristics of vegetative parts including the root, stem, leaf in cultivated Iraq for the species Brassciaaleraceacabbage, where the study dealt with the stomatal index and the rate of both the length and width of the stomatal complex and the thickness of the periderm, the tissue, cortex, vascular cylinder and pith. The parts were taken and measured after the plant was treated with brassinolide and the treated species with brassinolide and non-treated were measured and the study showed that there was a clear variation in the properties above.

Publication Date
Thu Feb 04 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Study in the procedural provisions of the action consumption incidents A comparative study Under Iraqi Consumer Protection Act No. 1 of 2010.: Study in the procedural provisions of the action consumption incidents A comparative study Under Iraqi Consumer Protection Act No. 1 of 2010.
...Show More Authors

This research Sheds highlights the procedural protections that must be enjoyed by the consumer in the face of the product, which is the protection of no less dangerous than the substantive protection of our obligations and duties delivered by the legislature upon the product of consumer interest, what is the benefit of the right if the access road to him complicated, so know The consumer has a right to the face of the product, but leaves the claim, either to ignorance For access to this right either to the difficulty of connecting to him.
That this research modest attempt we tried through which to focus on the way to the consumer behavior of arrived right, as we tried to highlight the weaknesses and the complexity of the procedure to

... Show More
View Publication
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Extraction of Iraqi Jasminumsambac (L.)Oil and Study It?s Effect as Antioxidant Agents
...Show More Authors

Key words:Jasminumsambac, Volatile oil, Antioxidant.

View Publication Preview PDF
Crossref (1)
Crossref