Preferred Language
Articles
/
jcoeduw-538
Suggested Plan for Developing the Sources of Energy in Enviroment In Light Of Sustinable Development and the Affective Of Geographic Arabic Teacher
...Show More Authors

It is known that energy subiect has ocuppied a lot of scientests minds about
how to treat the traditional energy and the renewing energy . we know that
most traditional energy coal , oil , Natural gas, neuclear fuel , are limited
guantiy and alsow subjected to be ended .Statics studies refer to reserve
of oil in world will exhausted btween ( 2075- 2100) and alsow cosl too .
While neuclear fuerl which the world seek today through explod the uranium
atom ( 233) the therum atom (239) and neuclear mxied through ruemlear
mixing , These energy have effect on environment and humanity speciaty if
they are used in militery purposes .
For all theses scientests srarch for resources of renewing enery through
researches studies , using environment technology reduce traditional energy,
they found that the resources of ernewing energy ( sun power , wind power ,
mechanical power of water,chamical power of water , underland power
,aidragyn power , natural power, laser power )
The presnet study try to make suggestd plan to develop the resources of
traditional and contionuos energy and use them in arabic enviroment . The
researcher found there is no plan for developing energy resources , he tried
through this study to present infront of researchers and discuss the geogrphy
teachers role who have the ability and srarch in natural resouces specially
the resources of engery , through planning and developing these resources
reaching to ( sustainable development ) which appear as a new concept for
development and planning after 1997 by ( UN programm ) in developing the
resources of humanity and nature and the right present and future
generation far away from ( poverty + ignorance + disease ) specially in arabic
enviroment

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
The International Journal Of Biotechnology,
LACTIC ACID AS SPACER BETWEEN POLY ACRYLIC ACID AND 4- AMINOANTIPYRINE
...Show More Authors

Preview PDF
Publication Date
Thu Jan 24 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
On strongly E-convex sets and strongly E-convex cone sets
...Show More Authors

              -convex sets and -convex functions, which are considered as an important class of generalized convex sets and convex functions, have been introduced and studied by Youness [5] and other researchers. This class has recently extended, by Youness, to strongly -convex sets and strongly -convex functions. In these generalized classes, the definitions of the classical convex sets and convex functions are relaxed and introduced with respect to a mapping . In this paper, new properties of strongly -convex sets are presented. We define strongly -convex hull, strongly -convex cone, and strongly -convex cone hull and we proof some of their properties.  Some examples to illustrate the aforementioned concepts and to cl

... Show More
View Publication
Crossref
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Mathematics In Operational Research
A single server fuzzy queues with priority and unequal service rates
...Show More Authors

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Aug 14 2017
Journal Name
Oriental Journal Of Chemistry
Leucine Aminopeptidase from Arachis hypogaea L. Seeds Partial Purification and Characterization
...Show More Authors

Leucine amino peptidases (LAP; EC 3.4.11.1) constitute a diverse set of exopeptidases that catalyze the hydrolysis of leucine residues from the amino-terminal of protein or peptide substrates, (LAP) are present in animals, plants, and microbes. In this study, leucine amino peptidase was purified partial from Arachis hypogaea seeds by using gel filtration chromatography Sephadex G-100. The enzyme was purified 3.965 fold with a recovery of 29.4%. Its pH and temperature optimum were(8.7) and (37oC), respectively. The results show novel properties of LAP from Arachis hypogaea L. or peanut. The Km value for LAP (77 mM), with V max (1538 m mole min-1). We recommend a separate isoenzymeof the enzyme (LAP) from Arachis hypogaea on L. peanut seeds a

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Apr 30 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences (ihjpas)
Biochemical Study on Splenectomy and Non Splenectomy Iraqi Major Thalassemic Patients
...Show More Authors

Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Wed Aug 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Serum Oxidative Stress and Creatine Kinase Activity Related to Hoffman's Syndrome
...Show More Authors

Several symptoms of hypothyroidism characterized by low

FT3 and FT4 were classified into hypothyroidism and Hoffman's syndrome .It was accepted that free radical generation and lipid peroxidation are associated with  many diseases. Creatine kinase in serum is affected by thyroid hormones. This study was undertaken to investigate the relationship between  malondialdehyde  as a general lipid peroxidation marker and CK activity in patients with primary hypothyroidism and Hoffman's syndrome which indicatees hypothyroidism with undetectable FT3 and FT4 in serum with elevated values of  TSH.

The study revealed that MDA is within the normal range, while CK activities in sera of Hoffman's syndrome were increas

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 01 2014
Journal Name
International Journal Of Engineering And Innovative Technology (ijeit)
New Predictive Block Matching Searching Algorithms and Hybrid Predictive Search System
...Show More Authors

In this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests

... Show More
View Publication Preview PDF