Preferred Language
Articles
/
jih-3291
A Morphological and Anatomical Study of Tamarix aphylla (Tamaricaceae) in Iraq Central Region
...Show More Authors

The Tamarix aphylla is a wild perennial shrub with erect stems that are long and glabrous. They have leaves that are simple, alternate, sheathed, and the apex of the blade is acuminate. And a scaly clawed bract and the the inflorescences were simple, spike-like. The pistil consists of ovary pyramidal, 3 styles, and 3 stigmas. The androecium consists of five stamens that are antisepalous. The perianth was distinct with five sepals and five petals. The fruits were capsule-shaped, pyramidal, and smooth. The seed has an apical pappus of unicellular hygroscopic hairs; endosperm is absent. The anatomical study of the leaves contained a uniseriate epidermis consisting of one layer of elongated cells covered by a layer of papillary cuticle. The upper epidermis cells are larger than the lower epidermis cells, and the stomata were anomocytic. The mesophyll consists of one layer of palisade cells and several layers of irregular, spongy cells. The stem epidermis is uniseriate, which is a single row of circular to ovate cells covered by a layer of papillary cuticle. The cortex is composed of two tissues, collenchyma and parenchyma; lamellate collenchyma tissue consists of 1-2 layers of cells; and parenchyma tissue consists of several layers of cells. The vascular bundle was ovate. The pith tissue consisted of circular parenchyma cells that were thin-walled and occupied the central part of the stem.  

Crossref
View Publication
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Semisimple Modules Relative to A Semiradical Property
...Show More Authors

    In this paper, we introduce the concept of s.p-semisimple module. Let S be a semiradical property, we say that a module M is s.p - semisimple if for every submodule N of M, there exists a direct summand K of M such that K ≤ N and N / K has S. we prove that a module M is s.p - semisimple module if and only if for every submodule A of M, there exists a direct summand B of M such that A = B + C and C has S. Also, we prove that for a module M is s.p - semisimple if and only if for every submodule A of M, there exists an idempotent e ∊ End(M) such that e(M) ≤ A and (1- e)(A) has S. 

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Human Recognition Using Ear Features: A Review
...Show More Authors

Over the past few years, ear biometrics has attracted a lot of attention. It is a trusted biometric for the identification and recognition of humans due to its consistent shape and rich texture variation. The ear presents an attractive solution since it is visible, ear images are easily captured, and the ear structure remains relatively stable over time.  In this paper, a comprehensive review of prior research was conducted to establish the efficacy of utilizing ear features for individual identification through the employment of both manually-crafted features and deep-learning approaches. The objective of this model is to present the accuracy rate of person identification systems based on either manually-crafted features such as D

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Solid State Technology
Image Fusion Using A Convolutional Neural Network
...Show More Authors

Image Fusion Using A Convolutional Neural Network

Publication Date
Thu Jul 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Application
Forecasting enhancement using a hodrick-prescott filter
...Show More Authors

: Sound forecasts are essential elements of planning, especially for dealing with seasonality, sudden changes in demand levels, strikes, large fluctuations in the economy, and price-cutting manoeuvres for competition. Forecasting can help decision maker to manage these problems by identifying which technologies are appropriate for their needs. The proposal forecasting model is utilized to extract the trend and cyclical component individually through developing the Hodrick–Prescott filter technique. Then, the fit models of these two real components are estimated to predict the future behaviour of electricity peak load. Accordingly, the optimal model obtained to fit the periodic component is estimated using spectrum analysis and Fourier mod

... Show More
Preview PDF
Scopus
Publication Date
Wed Sep 22 2021
Journal Name
Samarra Journal Of Pure And Applied Science
Toward Constructing a Balanced Intrusion Detection Dataset
...Show More Authors

Several Intrusion Detection Systems (IDS) have been proposed in the current decade. Most datasets which associate with intrusion detection dataset suffer from an imbalance class problem. This problem limits the performance of classifier for minority classes. This paper has presented a novel class imbalance processing technology for large scale multiclass dataset, referred to as BMCD. Our algorithm is based on adapting the Synthetic Minority Over-Sampling Technique (SMOTE) with multiclass dataset to improve the detection rate of minority classes while ensuring efficiency. In this work we have been combined five individual CICIDS2017 dataset to create one multiclass dataset which contains several types of attacks. To prove the eff

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
A Proposed Agent System for Network Monitoring
...Show More Authors

The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
A Modified Key Scheduling Algorithm for RC4
...Show More Authors

Rivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 03 2022
Journal Name
Tikrit Journal Of Pure Science
A Pixel Based Method for Image Compression
...Show More Authors

The basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Sep 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Palm Leaf as a Thermal Insulation Material
...Show More Authors

This paper presents calculat,ion of thermal conductivity (K) of palm

leaf  experimentally  using  Lee s  disc  method   to  be  used  as   thermal

insulator. The therma l conducti vity is found to be equal to (k=0.03W/mK)

indicating  that  palm l eaf is a good thermal  insulator com pared to the other insulators. The effect of the thermal insulator   thickness  on temperature di lTt::rence,  heat   transfer    coefficient,   thermal     conductance,   thermal resistance,  thermal  insulation are in vestigated in this paper. It was  found that

... Show More
View Publication Preview PDF