Preferred Language
Articles
/
iRf1UZEBVTCNdQwCl5So
A New Face Swap Detection Technique for Digital Images
...Show More Authors

Scopus
View Publication
Publication Date
Tue Apr 02 2024
Journal Name
Al-iraqia Journal Of Scientific Engineering Research
Prioritise Five Tafseer Translators Using Clustering Technique for Surah Al-Baqarah
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Improvement of the technique for the solution method of Gauss Seidel
...Show More Authors

In this paper, a new approach was suggested to the method of Gauss Seidel through the controlling of equations installation before the beginning of the method in the traditional way. New structure of equations occur after the diagnosis of the variable that causes the fluctuation and the slow extract of the results, then eradicating this variable. This procedure leads to a higher accuracy and less number of steps than the old method. By using the this proposed method, there will be a possibility of solving many of divergent values equations which cannot be solved by the old style.

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Nov 02 2011
Journal Name
Journal Of Engineering
Implementation of Gypseous Soil-asphalt Stabilization Technique for Base Course Construction
...Show More Authors

The aim of this research work is to study the effect of stabilizing gypseous soil, which covers vast areas in the middle, west and south parts of Iraq, using liquid asphalt on its strength properties to be used as a base course layer replacing the traditional materials of coarse aggregate and broken stones which are scarce at economical prices and hauling distances. Gypseous soil brought from Al-Ramadi City, west of Iraq, with gypsum content of 66.65%, medium curing cutback asphalt (MC-30), and hydrated lime are used in this study. The conducted tests on untreated and treated gypseous soil with different percentages of medium curing cutback asphalt (MC-30), water, and lime were: unconfined compression strength, and one dimensional confine

... Show More
Publication Date
Thu Dec 30 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Design a system for an approved video copyright over cloud based on biometric iris and random walk generator using watermark technique
...Show More Authors

View Publication
Scopus (53)
Crossref (12)
Scopus Crossref
Publication Date
Fri Sep 25 2020
Journal Name
Open Access Macedonian Journal Of Medical Sciences
Tuberculosis versus COVID-19 Mortality: A New Evidence
...Show More Authors

BACKGROUND: Coronavirus current pandemic (COVID-19) is the striking subject worldwide hitting countries in an unexplained non-universal pattern. Bacillus Calmette–Guérin (BCG) vaccine was an adopted recent justification depending on its non-specific immune activation properties. Still the problem of post-vaccine short duration of protection needs to be solved. The same protective mechanism was identified in active or latent tuberculosis (TB). For each single patient of active TB, there are about nine cases of asymptomatic latent TB apparently normal individuals living within the community without restrictions carrying benefits of immune activation and involved in re-infection cycles in an excellent example of repeated immunity tr

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Mon Sep 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The New Synthesis of Potassium-Exchange Zeolite A
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Microbiological studies of a new naphthoquinone semicarbazone derivatives
...Show More Authors

The antimicrobial activity of two naphthoquinone semicarbazone derivatives (Two newly synthesized compounds) have been studied by using tube — diluation and disc plate technique. The effect of those derivatives upon pathogenic microorganism iso-lated from specimen(urine iwounds,stool, swabs, throat ....etc) have been studied also in comparison with the antibiotics (amikacin,ampicillin, carbencillin, cephalothin, cefoxitin,clindamycin ,erythromycin,gentamycin,penicillin,tetracylin and tri-methoprim. It was shown that derivative(1) had more effective against micro organ-ism than derivative(11).

View Publication Preview PDF
Publication Date
Sun Jul 01 1990
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A New Species of Systole Walker (Hymenoptera, Eurytomidae)
...Show More Authors

Systole merazvensis sp. n. from Iraq, is described, figuri4 and differentiated from ,other species of the genus Systok.

View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SPERGULARIA IRAQENSIS (CARYOPHYLLACEAE), A NEW SPECIES FROM IRAQ
...Show More Authors

Spergularia iraqensis sp. nov. is described as a new species from Iraq. This species has been collected from Diyala Province in the central east of Iraq; it is closely related to Spergularia rubra (L.) J. Presl & C. Presl, 1819 and Spergularia bocconei (Scheele) Graebn., 1919.
The distinguishing of the morphological characteristics of the new species alongside the two similar species are discussed with photographs, and an identification key is given for Spergularia iraqensis and other closely related species.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More