Preferred Language
Articles
/
gRaXfIwBVTCNdQwCBPzb
Studying the Molecular Interactions for Potash Alum with Distilled Water and Aqueous Solution of Ethylene Glycol at Different Temperatures.
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Feb 27 2020
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
SUGGESTING MULTIPHASE REGRESSION MODEL ESTIMATION WITH SOME THRESHOLD POINT
...Show More Authors

The estimation of the regular regression model requires several assumptions to be satisfied such as "linearity". One problem occurs by partitioning the regression curve into two (or more) parts and then joining them by threshold point(s). This situation is regarded as a linearity violation of regression. Therefore, the multiphase regression model is received increasing attention as an alternative approach which describes the changing of the behavior of the phenomenon through threshold point estimation. Maximum likelihood estimator "MLE" has been used in both model and threshold point estimations. However, MLE is not resistant against violations such as outliers' existence or in case of the heavy-tailed error distribution. The main goal of t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Neurological Perfectionism in Talented Individuals with Disabilities “Case Study”
...Show More Authors

The study aims to identify the neurological perfectionism of talented girls with disabilities and do a case study for one of these girls. The sample of the study consisted of (11) female students at the university level, 5 females with disability and (6) normal female-students. The sample also included (19) secondary school female students in Tabuk region, including 10 students with visual disability and (9) normal students. The case study was limited to one case of mentally superior girls (talented) with kinetic disability. The researcher adopted the descriptive methodology (case study), he used neurological perfectionism scale, Salah Mekhemar interview, Stanford interfacial intelligence scale fifth picture, case study form. The re

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2009
Journal Name
Al-kindy College Medical Journal
Glucose Tolerance in Pregnant Women Inflicted with Candida Albicans
...Show More Authors

Background: Many previous studies were concerned with
the relationship between gestational diabetes and the
development of vaginal candidiasis in pregnant women. In
this study, our aim is directed to uncover glucose tolerance
status in non-diabetic pregnant women inflicted with
candida albicans.
Methods: Thirty-four pregnant women with vaginal
condidiasis (as demonstrated by microscopy) were enrolled
in this study. The patients were nearly similar in their
anthropometric and demographic criteria with those of the
healthy pregnant women (control group, forty –two
women). Fasting plasma sugar and glucose tolerance test
were alone for all patients and control group.
Results: fasting plasma sugar was

... Show More
View Publication Preview PDF
Publication Date
Sun May 25 2025
Journal Name
Research Journal Of Chemistry And Environment
Resveratrol: An Outstanding Natural Compound With Broad Biomedical Applications
...Show More Authors

In 1939, the Japanese scientist Michio Takaoka first mentioned resveratrol from Veratrum grandiflorum O. Loes. Majority of plants, such as grapes, berries, and peanuts, are significant sources of resveratrol, a well-known polyphenolic. resveratrol (RV) is noted for its links to several health care benefits, including glucose metabolism, anti-aging, cardioprotective, neuroprotective, antitumor, antidiabetic, and antioxidant effects. Importantly, there have been reports of promising therapeutic qualities in atherosclerosis, dementia, and various malignancies. These properties are controlled through a number of cooperative techniques, which control inflammation besides the effects of oxidative stress and cell death. However, circulating resver

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Egocentrism & its Relationship with Academic Adaptation among University students
...Show More Authors

The research aimed to identifying :

  1. Egocentrism of the university students .
  2. Academic adaptation of the university student.
  3. Differences in Egocentrism according to the both variable ( Gender and Specialization ) of the university student.
  4. Differences in academic adaptation according to the both variable ( Gender and Specialization ) of the university student .
  5. The Contribution of academic adaptation to Egocentrism of the university student .

The sample of the research consisted of ( 400 ) students.      
Tow instruments have been us

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 09 2020
Journal Name
Agrosystems, Geosciences & Environment
In-season potato yield prediction with active optical sensors
...Show More Authors

Crop yield prediction is a critical measurement, especially in the time when parts of the world are suffering from farming issues. Yield forecasting gives an alert regarding economic trading, food production monitoring, and global food security. This research was conducted to investigate whether active optical sensors could be utilized for potato (Solanum tuberosum L.) yield prediction at the mid.le of the growing season. Three potato cultivars (Russet Burbank, Superior, and Shepody) were planted and six rates of N (0, 56, 112, 168, 224, and 280 kg ha−1), ammonium sulfate, which was replaced by ammonium nitrate in the 2nd year, were applied on 11 sites in a randomized complete block design, with four replications. Normalized difference ve

... Show More
View Publication
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref
Publication Date
Sun Apr 01 2007
Journal Name
Journal Of Engineering
CURVATURE DUCTILITYOF REINFORCED CONCRETE BEAMSECTIONS STIFFENED WITH STEEL PLATES
...Show More Authors

Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF