Preferred Language
Articles
/
ijp-947
UV-Irradiation Effect on PC/DOP Composite in the C=C Region
...Show More Authors

In this research we study the effect of UV radiation on pure PC samples and doped samples with plasticizer (DOP) for different exposure times (6, 12, 18, 24h). The study have been made on the change in the IR spectra causes by the UV radiation on both kinds of samples, besides the morphology changes were also studied by the optical microscope. From the results we conclude that the increasing of exposure causes the elaboration of CO2 and C2 gases.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 10 2018
Journal Name
Commun.fac.sci.univ.ank.series A2-a3
ULTRAHIGH SENSITIVE REFRACTIVE INDEX SENSOR BASED ON TAPERED MULTICORE OPTICAL FIBER
...Show More Authors

The refractive index sensors based on tapered optical fiber are attractive for many industries due to sensing capability in a variety of application. In this paper, we proposed a refractive index sensor based on multicore fiber (MCF) sandwiched between two standard single mode fibers (SMF). The sensor consisting of three sections, SMF- MCF-SMF is structurally simple and can be easily produced by joining these parts. The MFC contains seven cores and these cores are surrounded by a single cladding. The sensing region is obtained by tapering the MCF section where the evanescent field is generated. The single mode propagating along the SMF is stimulated at the first joint and is coupled to the cladding modes. These modes interfere with the core

... Show More
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Comparison of Different DEM Generation Methods based on Open Source Datasets
...Show More Authors

Digital Elevation Model (DEM) is one of the developed techniques for relief representation.  The definition of a DEM construction is the modeling technique of earth surface from existing data. DEM plays a role as one of the fundamental information requirement that has been generally utilized in GIS data structures. The main aim of this research is to present a methodology for assessing DEMs generation methods. The DEMs data will be extracted from open source data e.g. Google Earth. The tested data will be compared with data produced from formal institutions such as General Directorate of Surveying. The study area has been chosen in south of Iraq (Al-Gharraf / Dhi Qar governorate. The methods of DEMs creation are kri

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 24 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
On strongly E-convex sets and strongly E-convex cone sets
...Show More Authors

              -convex sets and -convex functions, which are considered as an important class of generalized convex sets and convex functions, have been introduced and studied by Youness [5] and other researchers. This class has recently extended, by Youness, to strongly -convex sets and strongly -convex functions. In these generalized classes, the definitions of the classical convex sets and convex functions are relaxed and introduced with respect to a mapping . In this paper, new properties of strongly -convex sets are presented. We define strongly -convex hull, strongly -convex cone, and strongly -convex cone hull and we proof some of their properties.  Some examples to illustrate the aforementioned concepts and to cl

... Show More
View Publication
Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
On Solving Singular Multi Point Boundary Value Problems with Nonlocal Condition
...Show More Authors

In this paper Hermite interpolation method is used for solving linear and non-linear second order singular multi point boundary value problems with nonlocal condition. The approximate solution is found in the form of a rapidly convergent polynomial. We discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems. The examples to demonstrate the applicability and efficiency of the method have been given.

View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Iraqi Journal Of Cancer And Medical Genetics
Apoptotic Activity of methionine γ- lyase on several cancer cell lines
...Show More Authors

The apoptotic activity of methionine γ- lyase from Pseudomonas putida on cancer cell lines was indicated by measuring the concentration of cytochrome c in the supernatants of cell lines. The result revealed high concentration of cytochrome c in the supernatants of cancer cell lines (RD, AMGM and AMN3) respectively while the concentration of anti-apoptotic protein (Bcl-2) was very low.

Publication Date
Tue Jan 01 2019
Journal Name
Eurasian Chemico --technological Journal
Influence of addition (Mn) on enhance efficiency of (CuInTe2) photovoltaic cell
...Show More Authors

Publication Date
Tue Jun 01 2021
Journal Name
Ieee Systems Journal
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co

... Show More
Scopus (20)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
Building a Training Program on Developing Executive Functions for Kindergarten Children
...Show More Authors

Abstract
The research aims to build a training program to develop some executive functions for kindergarten children. To achieve this goal, the two researchers built the program according to the following steps:
1. Determining the general objective of the program.
2. Determining the behavioral objectives of the program.
3. Determining the included content in the program.
4. Implementing the content of the activities of the program.
5. Evaluating the Program.
The program included (12) training activities, the training activities included several items: the title of the activity, the time of implementation of the activity, the general objective of the activity, the procedural behavioral objective, the means and tools u

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 31 2022
Journal Name
Ingénierie Des Systèmes D Information
Iraqi Paradigm E-Voting System Based on Hyperledger Fabric Blockchain Platform
...Show More Authors

Voting is one of the most fundamental components of a democratic society. In 2021 Iraq held the Council of Representatives (CoR) elections in 83 electoral constituencies in 19 governorates. Nonetheless, several significant issues arose during this election, including the problem of logistics distribution, the excessively long period of ballot counting, voters can't know if their votes were counted or if their ballots were tampered with, and the inconsistent regulation of vote counting. Blockchain technology, which was just invented, may offer a solution to these problems. This paper introduces an electronic voting system for the Iraq Council of Representatives elections that is based on a prototype of the permission hyperledger fabr

... Show More
View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More