Preferred Language
Articles
/
gxb5j4oBVTCNdQwCZZ8t
Keratoconus Severity Detection From Elevation, Topography and Pachymetry Raw Data Using a Machine Learning Approach
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Feb 01 2016
Journal Name
Swarm And Evolutionary Computation
Improving the performance of evolutionary multi-objective co-clustering models for community detection in complex social networks
...Show More Authors

Scopus (34)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
The Determination of Lower Limit Detection of X-Ray Fluorescence for Zinc Powder Suspended in Engine Oil
...Show More Authors

In this work Different weight of pure Zinc powder suspended particles in 4ml base engine Oil were used.
Intensity of Kα Line was measured for the suspended particles ,also for mixture which consist from Zinc particle blended with Engine base Oil. Calibration Curve was drawn between Ikα line Intensity and Zinc concentration at different operation condition. The Lower Limit detection (LLD) and Sensitivity (m) of Spectrometer were determined for different Zinc Concentration (Wt%). The results of LLD and m for Samples were analyzed at Operation Condition of 30KV,17mA is best from Samples were analyzed at Operation Condition of 25KV,15mA

View Publication Preview PDF
Publication Date
Wed May 24 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
PREPARATION CONCETRATE PROTEIN FROM AL- ZAHDI DATE’S PITS AND USED FOR BISCUIT FORTIFICATION: PREPARATION CONCETRATE PROTEIN FROM AL- ZAHDI DATE’S PITS AND USED FOR BISCUIT FORTIFICATION
...Show More Authors

This study was conducted to prepare protein concentrates from AL-Zahdidate’s pits by using alkaline methods where the chemical composition of the pits were (7.30, 1.04, 5.80, 8.68 and 77.19) % for each of the moisture, ash, protein, fat and carbohydrates respectively and the chemical composition of the concentrate protein was (6.62, 4.10, 26.70, 0.93, and 58.65) % respectively. The content of protein concentrate from the metallic elements (144.07, 25.11, 15.02, 0.49, 0.59, 0.27, 0.22 and 234.6) mg/ 100 g each of potassium, magnesium, calcium, iron, manganese, copper, zinc and phosphorus respectively. The results of SDS-PAGE showed five bands with weights molecular ranged between 11000-70000 Dalton. Give the biscuit which contain protei

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Extraction, Purification and Characterization of Peroxidase from Pseudomonas aeruginosa and Utility as Antioxidant and Anticancer
...Show More Authors

        Peroxidase is a class of oxidation-reduction reaction enzyme that is useful for accelerating many oxidative reactions that protect cells from the harmful effects of free radicals. Peroxidase is found in many common sources like plants, animals and microbes and have extensive uses in numerous industries such as industrial, medical and food processing. In this study, P. aeruginosa was harvested to utilize and study its peroxidases. P. aeruginosa was isolated from a burn patient, and the isolate was verified as P. aeruginosa using staining techniques, biochemical assay, morphological, and a sensitivity test. The gram stain and biochemical test result show rod pink gram-ne

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Mon Jan 07 2013
Journal Name
Journal Of Educational And Psychological Researches
The effective of utilization Blending learning on academic achievement in Biology course of second class students in secondary special schools in Omdurman Locality and attitudes towards it.
...Show More Authors

This research aimed to definite Blending learning (BL) technique, and to know the impact of its use onacademic achievement in Biology course of second class students in secondary special schools in Omdurman Locality and attitudes towards it, to achieve this; researcher adopted the experimental method. The sample was selected of (41) students, chosen from Atabiyah school, were divided into two equals groups: one experimental group reached (26) students studied by using the  BL technique, and the second control group (25) students have been taught in the traditional method.

   Data has collected by using two tools: achievement test and a questionnaire for measuring the attitudes towards Blend

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Eco Env And Cons
Histological changes resulting from the use of sublethal concentrations from insecticide.....
...Show More Authors

.

Publication Date
Thu Oct 01 2015
Journal Name
Iraqi Journal Of Science
optimization of pectinase production from pesudomonas sp. isolated from iraqi soi
...Show More Authors

Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Nov 18 2014
Journal Name
Conference: First International Engineering Conference (iec2014)at: Ishik University, Erbil, Krg, Iraq
Visualization of People Attraction from Mobile Phone Trace Database: A Case study on Armada 2008 in French City of Rouen
...Show More Authors

The mobile phone is widespread all over the world. This technology is one of the most widespread with more than five billion subscriptions making people describe this interaction system as Wireless Intelligence. Mobile phone networks become the focus of attention of researchers, organizations and governments due to its penetration in all life fields. Analyzing mobile phone traces allows describing human mobility with accuracy as never done before. The main objective in this contribution is to represent the people density in specific regions at specific duration of time according to raw data (mobile phone traces). This type of spatio-temporal data named CDR (Call Data Records), which have properties of the time and spatial indications for th

... Show More