Preferred Language
Articles
/
bsj-4929
The Spatial Analysis for Bassia eriophora (Schrad.) Asch. Plant Distributed in all IRAQ by Using RS & GIS Techniques
...Show More Authors

        Most vegetation’s are Land cover (LC) for the globe, and there is an increased attention to plants since they represent an element of balance to natural ecology and maintain the natural balance of rapid changes due to systematic and random human uses, including the subject of the current study (Bassia eriophora ) Which represent an essential part of the United Nations system for land cover classification (LCCS), developed by the World Food Organization (FAO) and the world Organization for environmental program (UNEP), to observe basic environmental elements with modern techniques. Although this plant is distributed all over Iraq, we found that this plant exists primarily in the middle and southern parts of Iraq in wet areas and near rivers or catchment area or water basins.  The main idea is how to use this techniques to monitor the distribution of the plants (Bassia eriophora), in order to utilize and take provisions of plant growth and diffusion, Moreover, know and control the breadth of these areas in Iraq and prepare for them, and understanding climates and the variable plantation habitats and mapping patterns, may lead to a successful environmental protection and dominance plan. In this study, monitoring the distribution of Bassia eriophora in Iraq by apply remote sensing (RS) and geographic information systems (GIS) techniques. The data was obtained from (BAG) National Herbarium of Iraq, Ministry of Agriculture. (BUNH) Iraq Natural History Research Centre and Museum, University of Baghdad the University Herbarium (BUH) in College of Science at University of Baghdad. This data contains only the address (place of germination), this information (addresses) was detected, identified and covered for all areas sampled by the techniques of satellite imagery and images taken from the air and some data records where the main features of these areas.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
A Comparison of the Methods for Estimation of Reliability Function for Burr-XII Distribution by Using Simulation.
...Show More Authors

This deals with estimation of Reliability function and one shape parameter (?) of two- parameters Burr – XII , when ?(shape parameter is known) (?=0.5,1,1.5) and also the initial values of (?=1), while different sample shze n= 10, 20, 30, 50) bare used. The results depend on empirical study through simulation experiments are applied to compare the four methods of estimation, as well as computing the reliability function . The results of Mean square error indicates that Jacknif estimator is better than other three estimators , for all sample size and parameter values

View Publication Preview PDF
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
In Growing Toenail Treatment using Carbon Dioxide Laser
...Show More Authors

An ingrowing toenail is a common problem affecting mainly adolescents and young adults, with a male predominance of 3:1. The disorder generally occurs in big toes. It is painful and often chronic and it affects work and social activities. Most patients initially complain of pain and later discharge, infection and difficulty in walking occur. The Objectives: The purpose of the study was to evaluate the efficacy and safety of (10600nm) CO2 laser in the treatment of ingrowing toe nail. Patients, Materials & Methods: This study was done in laser medicine research clinics from July 2013 to the end of December 2013; 10 patients including 7(70%) males and 3 (30%) females with age ranging from 18 years to 70 years with mean age of 44 years o

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
The dialectic of form and meaning in postmodern art
...Show More Authors

Some have considered the dialectic in form and meaning from different points of view, and dismantled them from each other, and this view is correct if we adopt according to the logic of Aristotle when it comes to dialectic, the dialectic of form and meaning has different aspects and does not share a single line in terms of conceptual meaning, the form is the appearance What the recipient sees with the help of cognitive tools, the content or content is the mental meaning, which in turn depends on his own tools, and to this extent this view is correct, and the intellectual content or meaning of the artwork or the human message that the artist wants to convey to the viewer.
The research included four chapters. The first chapter included

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Chages in Sex Hormones in Female Working in Battries Manufacturing Plant
...Show More Authors

Lead has toxic effects on reproduction of both male and female.  It can cause decreased sex drive ,  infertility and abnormal menstrual cycle  in women.  This study was designed to evaluate the effect of exposure to lead in batteries female workers on sex hormones level in the serum.Thirty nine (39) female workers (volunteers) in Iraqi Batteries Manufacturing Plants, Al-Waziriya / Baghdad  were participated in this study. They are classified into 3 groups,  first group included fourteen (14) female that  have been employed for 1-7 years ,  second  group  included thirteen (13) female that have been employed for 8-14 years , third  grou

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 02 2024
Journal Name
Iraqi Journal Of Science
Using Sensitivity Analysis in Linear Programming with Practical Physical Applications
...Show More Authors

Linear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of models that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we dealt with the post optimality solution, or what is known as sensitivity analysis, using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model that will chan

... Show More
Preview PDF
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Estimation the Radioactive Pollution by Uranium in the Soil of Al-Kut City/ Iraq
...Show More Authors

The aim of the present work, was measuring of uranium concentrations in 25 soil samples from five locations of Al-Kut city. The samples taken from different depths ranged from soil surface to 60cm step 15 cm, for this measurement of uranium concentrations .The most widely used technique SSNTDs was chosen to be the measurement technique. Results showed that the higher concentrations were in Hai Al- Kafaat which recorded 1.49 ± 0.054 ppm . The uranium content in soil samples were less than permissible limit of UNSCEAR(11.7ppm).

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Used Approaches In Formulating Accounting Standards in Iraq & Their Develop Importance: filed Study
...Show More Authors

This research aims to show the most important approaches applicable in forming the accounting standards , the  importance approaches used to formulate local accounting standards & the  need to cancel or develop the unified accounting system in Iraq besides activate the local auditing & accounting standards council to issue accounting standards able to save the relevance & Reliable accounting information that serve the decisions of stockholders and others of stakeholders in the incorporate companies , especially the companies listed in the Iraq securities exchange , So this study based partially on analyzing the questionnaire form which has been designed to inquiry the specialists and experts opinion about the accoun

... Show More
View Publication Preview PDF
Publication Date
Mon May 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Comparison hybrid techniques-based mixed transform using compression and quality metrics
...Show More Authors

Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication