Preferred Language
Articles
/
jcois-545
A book in the science of rhyme for the father of conquest Othman bin Jinni ‹v 392 e›: Investigation and study
...Show More Authors

This book in our hands is a 'book in the science of rhymes' written by the linguistic and grammatical world 'Othman bin Jenni' 'T 392 AH', and included in it: the concept of rhyme, its characters, movements, and disadvantages, with mention of its ramifications, defining them by definition, clarification and martyrdom poetry, It is concise in size, but it is a book containing a full science in its content.
The study was divided into two parts, the first: the study, and included a study of the author and the author, I talked first about his life, such as his name and origin, and scientific status, and the words of scientists in it, and so on, and secondly: the name of the book, and his percentage, and the time of its composition, etc. In addition, Section II: Investigation, I talked about the description of the written version, and the method of investigation, followed by the text achieved, concluding the research mentioning proven sources and references. God grants success.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Journal Of Engineering
Thixotropic Hardening of Fao Clay
...Show More Authors

Fao region is characterized by weak soft silty clay to clayey silt thick layer which extends to a depth of about 20 m. The construction of some structures on such soils may needs piles. During the installation of driven piles, the soil geotechnical properties are exposed to significant changes result due to shearing under large shear strains. These changes significantly decrease the shear strength of the virgin soil due to the destruction of soil structure caused by remolding. The degradation of shear strength is usually followed by strength regaining which is called “Thixotropy”. In this study, the thixotropic effect on Fao clay was investigated. Many disturbed and undisturbed soil samples were brought from Fao regi

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Jul 01 2001
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
CHECK LIST OF IRAQI BRYOFLORA
...Show More Authors

The pioneer contributions included a sign for Iraqi Bryoflora were those of (Juratzka &
Milde) and Schiffner published at the end of the 19th century i.e. (1870 & 1897) respectively.
However, throughout the whole next century, the 20th, only few papers, by different authors,
have been published separately. They are Schiffner (1913); Handel-Mazzetti (1914); Froelich
(1959); Vondracek (1962 & 1965); Agnew &Townsend (1970); Agnew ( 1973 ) ; Agnew&
Vondracek (1975); Long (1979); Al-Ni’ma (1994). The most comprehensive work among
them was the “Moss Flora of Iraq” by Agnew & Vondracek (1975). It included a description
of 54 genera and 145 species with an identification key in addition to notes

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 06 2024
Journal Name
Indian Journal Of Entomology
Species of Chrysididae from Iraq
...Show More Authors

A survey of chrysidid wasps and an identification key to the genera from different localities in Iraq are provided. The genus Pseudomalus Ashmead, 1902 with Pseudomalus auratus (Linnaeus) and Omalus timidus (Nurse), are new records from Iraq. As well, a preliminary checklist of Iraq’s Chrysididae is suggested. Twenty species within nine genera in two subfamilies have been included in the current list. Historical information is provided together with remarks on the current taxonomic status and the particular validity for some species.

View Publication
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Pakistan Journal Of Agricultural Sciences
Pakistan Journal of Agricultural Sciences
...Show More Authors

View Publication
Crossref (7)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Innovation, Creativity And Change.
Multiple Intelligences and Their Relation to Blood Group Among University Students
...Show More Authors

Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Mefenamic Acid Selective Membranes Sensor and Its Application to pharmaceutical Analysis
...Show More Authors

PVC membrane sensor for the selective determination of Mefenamic acid (MFA) was constructed. The sensor is based on ion association of MFA with Dodecaphospho molybdic acid (PMA) and Dodeca–Tungstophosphoric acid(PTA) as ion pairs. Nitro benzene (NB) and di-butyl phthalate (DBPH) were used as plasticizing agents in PVC matrix membranes. The specification of sensor based on PMA showed a linear response of a concentration range 1.0 × 10–2 –1.0 × 10–5 M, Nernstian slopes of 17.1-18.86 mV/ decade, detection limit of 7 × 10-5 -9.5 × 10 -7M, pH range 3 – 8 , with correlation coefficients lying between 0.9992 and 0.9976, respectively. By using the ionphore based on PTA gives a concentration range of 1.0 × 10–4 –1.0 × 10–5 M,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jun 30 2011
Journal Name
Kufa Journal For Veterinary Medical Sciences
Bacterial isolation from burn wound infections and studying their antimicrobial susceptibility
...Show More Authors

The present study was carried out to determine the bacterial isolates and study their antimicrobial susceptibility in case of burned wound infections. 70 burn wound swabs were taken from patients, who presented invasive burn wound infection from both sex and average age of 3-58 years, admitted to teaching medical Al- Kendi hospital from October 2007 to June 2008. Pseudomonas aeruginosa was found to be the most common isolate (48.9%) followed by Staphylococcus aureus (24.4%), Citrobacter braakii (13.3%), Enterobacter spp. (11.1%), Coagulase-negative Staphylococci (11.1%), Proteus vulgaris (6.66%), Corynebacterium spp. (6.66%), Micrococcus (6.66%), Proteus mirabilis (4.44%), Enterococcus faecalis (4.44%), E.coli (4.44%), Klebsiella spp. (2.22

... Show More
Preview PDF
Crossref (11)
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref