Preferred Language
Articles
/
bsj-3774
Fixed Point Theorems in General Metric Space with an Application
...Show More Authors

   This paper aims to prove an existence theorem for Voltera-type equation in a generalized G- metric space, called the -metric space, where the fixed-point theorem in - metric space is discussed and its application.  First, a new contraction of Hardy-Rogess type is presented and also then fixed point theorem is established for these contractions in the setup of -metric spaces. As application, an existence result for Voltera integral equation is obtained.  

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Applied Mechanics And Materials
Artistic Techniques for Developing Creativity in Design
...Show More Authors

The design of future will still be the most confusing and puzzling issue and misgivings that arouse worry and leading to the spirit of adventures to make progress and arrive at the ways of reviving, creativity and modernism. The idea of prevailing of a certain culture or certain product in design depends on the given and available techniques, due to the fact that the computer and their artistic techniques become very important and vital to reinforce the image in the design. Thus, it is very necessary to link between these techniques and suitable way to reform the mentality by which the design will be reformed, from what has been said, (there has no utilization for the whole modern and available graphic techniques in the design proce

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Wed Sep 29 2021
Journal Name
College Of Islamic Sciences
The Juristic Rulings Concerning Those in Debts
...Show More Authors

Abstract:

This research aimed to shed light on the juristic rulings concerning those in debts. It adopted the inductive approach, the analytical approach and the comparative approach. It tackled the following issues: definition of Zakat, the channels of paying Zakat, definition of those in debts, types of those in debts, those in debts who are not entitled to take Zakat, their cases, spending money by those in debts if taken by those in debts and the poor, and when those in debts become rich before paying their debts, and the ruling on paying the debt of the dead indebted from the Zakat money.

The most important results of the research are as follows:

Muslim jurists

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 27 2025
Journal Name
Al-salam Journal For Medical Science
Nanotechnology in Molecular Genetics: A literature review
...Show More Authors

Nanotechnology extends the limits of molecular diagnostics to the nanoscale. This study describes some of the details of how the body interacts with nanoparticles. Biological tests measuring the presence or activity of selected substances become quicker, more sensitive, and more flexible when certain nanoscale particles are put to work as tags. Particular emphasis is placed on the effects of surface changes on body-borne particles, their transport within the body, and the dose-response effect. Other considerations include the definition of "persistent" in the context of therapy, FDA scientific committees, and the need for nanoparticle tracking. In short, there have been dramatic changes in molecular and genetic research findings, as well as

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Apr 01 2009
Journal Name
2009 Ieee Wireless Communications And Networking Conference
Power Efficiency Maximization in Cognitive Radio Networks
...Show More Authors

Cognitive radio technology is used to improve spectrum efficiency by having the cognitive radios act as secondary users to access primary frequency bands when they are not currently being used. In general conditions, cognitive secondary users are mobile nodes powered by battery and consuming power is one of the most important problem that facing cognitive networks; therefore, the power consumption is considered as a main constraint. In this paper, we study the performance of cognitive radio networks considering the sensing parameters as well as power constraint. The power constraint is integrated into the objective function named power efficiency which is a combination of the main system parameters of the cognitive network. We prove the exi

... Show More
View Publication
Scopus (16)
Crossref (10)
Scopus Crossref
Publication Date
Thu Jun 30 2011
Journal Name
Al-kindy College Medical Journal
Asymptomatic Bacteriuria in Pregnant and Diabetic Women
...Show More Authors

Background: Asymptomatic bacteriuria (ASB) is
defined as isolation of a specified quantitative count
of bacteria in an appropriately collected urine
specimen from an individual without symptoms or
signs of urinary tract infection.
Aim of study: To evaluate the frequency of
bacteriuria according to age, pregnancy, and type II
diabetes mellitus in a sample of Iraqi women.
Patients and Methods: A total of 125 female
individuals were involved. The study participants
were classified into the following groups: nonpregnant
women with type II diabetes mellitus,
pregnant women with type II diabetes mellitus,
pregnant women without type II diabetes mellitus, and
apparently healthy non-pregnant women. Urine

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
Knowledge And Awareness Towards Cryptosporidiosis In Baghdad
Knowledge and awareness towards Cryptosporidiosis in Baghdad
...Show More Authors

Knowledge and awareness towards cryptosporidiosis were assessed in this study during the period from April 2009 till June 2011, among 188 person of both gender which were divided in different groups and sub groups as following Group 1: include 48 physician from different hospitals and primary health care centers in Baghdad this group were sub divided into 30 Specialist doctors and 18 General practitioners doctors. Group 2 : include 45 teaching staff member from Biology department , Biotechnology department in University of Baghdad and AL-Nahrain University as well as teaching staff member from the college of medicine – University of Baghdad and University of Mustansiryah, this group were sub divided into 9 Ph.D and 36 M.Sc. + B.Sc. me

... Show More
Publication Date
Sat Jul 01 2017
Journal Name
International Journal Of Computer Networks And Wireless Communications
Performance Analysis of VoIP in Wireless Networks
...Show More Authors

Voice over Internet Protocol (VoIP) is important technology that’s rapidly growing in the wireless networks. The Quality of Service (QoS) and Capacity are two of the most important issues that still need to be researched on wireless VoIP. The main aim of this paper is to analysis the performance of the VoIP application in wireless networks, with respect to different transport layer protocols and audio codec. Two scenarios used in the simulation stage. In the first scenario VoIP with codec G.711 transmitted over User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), and Real-Time Transport Protocol (RTP). While, in the second scenario VoIP with codec G.726 transmitted over UDP, SCTP, and RTP protocols. Network simulator

... Show More
View Publication
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Developed JPEG Algorithm Applied in Image Compression
...Show More Authors
Abstract<p>JPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.</p>
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Al-qadisiyah Journal Of Veterinary Medicine Sciences
Mycoplasma gallisepticum Infection in Poultry: Article Review
...Show More Authors

Preview PDF