Preferred Language
Articles
/
bsj-2484
On Soft Turning Points
...Show More Authors

The soft sets were known since 1999, and because of their wide applications and their great flexibility to solve the problems, we used these concepts to define new types of soft limit points, that we called soft turning points.Finally, we used these points to define new types of soft separation axioms and we study their properties.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Physics
Short-term effect of ultrasound therapy on stiffness elbow joint
...Show More Authors

Elbow stiffness is hard to treat and commonly resulted from trauma or degenerative arthritis. This study aimed to demonstrate the effectiveness of using ultrasound therapy in management of stiff elbow joint resulted from several etiological factors. A total number of 42 patients (35 male and 7 female) allocated randomly from the Department of Physiotherapy at Al-yarmouk Teaching Hospital during 2013. Each patient examined physically by physiotherapist taking in consideration the measurement of the joint movement angle using goniometer in flexion and the extension, and the pain score using visual analogue scale (VAS). Ultrasound therapy initiated thrice weekly for two weeks. At the time of entry, the means degree of flexion and extension

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
The general budget and censorship on it in Iraqi legislation
...Show More Authors

The main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Wed May 01 2019
Journal Name
Materials Science And Engineering
Effect of nanoparticles on thermal conductivity of epoxy resin system
...Show More Authors
Abstract<p>In this paper the effect of mixing TiO2 nanoparticles with epoxy resin is studied. The TiO2 nanoparticles would be synthesis and characterized by scanning electron microscopy (SEM), XRD FTIR, for two particle sizes of 50 and 25 nm. The thermal conductivity is measured with and without composite epoxy resin; the results showed that the thermal conductivity was increased as nanoparticle concentration increased too. The thermal conductivity was increased as particle size decreased.</p>
Preview PDF
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2016
Journal Name
2016 6th International Conference On Information Communication And Management (icicm)
Enhancing case-based reasoning retrieval using classification based on associations
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Influence of Temperature on Mechanical Properties of Asphalt Concrete Mixture
...Show More Authors

Asphalt binder is a thermoplastic material that conducts as an elastic solid at lower service temperatures or throughout fast loading rate. At a high temperature or slow rate of loading, asphalt binder conducts as a different liquid. The classical duplication generates a required to assess the mechanical properties of asphalt concrete at the anticipated service temperature to reduce the stress cracking, which happens at lower temperatures, fatigue, and the plastic deformation at higher temperatures (rutting). In this study, an achievement was made to assess the effect of temperature on the mechanical characteristics of asphalt concrete mixes. A total of 132 asphalt concrete samples were attended utilizing two asphalt cement grades (40-50) a

... Show More
Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Oct 15 2023
Journal Name
Sumer 4
CYTOTOXIC IMPACT OF OUTER MEMBRANE NANOVESICLES (OMVS) ON OVARIAN CANCER
...Show More Authors

This study focused on extracting the outer membrane nanovesicles (OMVs) from Escherichia coli BE2 (EC- OMVs) by ultracentrifugation, and the yield was 2.3mg/ml. This was followed by purification with gel filtration chromatography using Sephadex G-150, which was 2mg/ml. The morphology and size of purified EC-OMVs were confirmed by transmission electron microscopy (TEM) at 40-200 nm. The nature of functional groups in the vesicle vesicle was determined by Fourier transforms infrared spectroscopy (FT-IR) analysis. The antitumor activity of EC-OMVs was conducted in vitro by MTT assay in human ovarian (OV33) cancer cell line at 24,48 and 96hrs. The cytotoxicity test showed high susceptibility to the vesicles in ovarian compared to normal

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Optimal CPU Jobs Scheduling Method Based on Simulated Annealing Algorithm
...Show More Authors

     Task scheduling in an important element in a distributed system. It is vital how the jobs are correctly assigned for each computer’s processor to improve performance. The presented approaches attempt to reduce the expense of optimizing the use of the CPU. These techniques mostly lack planning and in need to be comprehensive. To address this fault, a hybrid optimization scheduling technique is proposed for the hybridization of both First-Come First-Served (FCFS), and Shortest Job First (SJF). In addition, we propose to apply Simulated Annealing (SA) algorithm as an optimization technique to find optimal job’s execution sequence considering both job’s entrance time and job’s execution time to balance them to reduce the job

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref