Preferred Language
Articles
/
jnhm-170
RECORDING OF FIVE MONOGENETIC TREMATODES FOR THE FIRST TIME FROM FISHES OF IRAQ
...Show More Authors

A total of 589 fishes, belonging to 23 species were collected from eight different localities
in north and mid Iraq during 1993. The parasitological inspection of such fishes revealed the
presence of 59 parasite species and two fungi. Among such parasites, five monogenetic
trematodes were recorded on the gills of some fishes for the first time in Iraq. These
included:- Ancyrocephalus vanbenedenii on Liza abu from Tigris river at Al-Zaafaraniya,
south of Baghdad; Dactylogyrus anchoratus on Cyprinus carpio from Tigris river at Al –
Zaafaranya D. minutus on C. carpio from both Tigris river at Al-Zaafaraniya and Euphrates
river at Al-Qadisiya dam lake; Discocotyle sagittata on L. abu from both the drainage system
at Al-Madaen district, south of Baghdad and Euphrates river at Al-Qadisiya dam lake and
Ancylodiscoides gomitus on Silurus triostegus from Tigris river at Al-Zaafaraniya.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Certain Types of Linear Codes over the Finite Field of Order Twenty-Five
...Show More Authors

The aim of the paper is to compute projective maximum distance separable codes, -MDS of two and three dimensions with certain lengths and Hamming weight distribution from the arcs in the projective line and plane over the finite field of order twenty-five. Also, the linear codes generated by an incidence matrix of points and lines of  were studied over different finite fields.  

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
Wavelet Analysis For Sunspot Time Series
...Show More Authors

Abstract

In this research we study the wavelet characteristics for the important time series known as Sunspot, on the aim of verifying the periodogram that other researchers had reached by the spectral transform, and noticing the variation in the period length on one side and the shifting on another.

A continuous wavelet analysis is done for this series and the periodogram in it is marked primarily. for more accuracy, the series is partitioned to its the approximate and the details components to five levels, filtering these components by using fixed threshold on one time and independent threshold on another, finding the noise series which represents the difference between

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Spectral Technique for Baud Time Estimation
...Show More Authors

A new approach for baud time (or baud rate) estimation of a random binary signal is presented. This approach utilizes the spectrum of the signal after nonlinear processing in a way that the estimation error can be reduced by simply increasing the number of the processed samples instead of increasing the sampling rate. The spectrum of the new signal is shown to give an accurate estimate about the baud time when there is no apriory information or any restricting preassumptions. The performance of the estimator for random binary square waves perturbed by white Gaussian noise and ISI is evaluated and compared with that of the conventional estimator of the zero crossing detector.

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 27 2020
Journal Name
Iraqi Journal Of Science
Software Development for First Aid Decision Support System
...Show More Authors

This work presents an approach to deal with modelling a decision support system framework to introduce an application for decisions in medical knowledge system analysis. First aid is extremely important worldwide and, hence, a decision support framework, know as First Aid Decision Support System (FADSS), was designed and implemented to access experimental cases exerting danger to the general population, offering advanced conditions for testing abilities in research and arranging an emergency treatment through the graphical user interface (UI). The design of first aid treatment in FADSS depends on the general cases in first aid. We presented a strategy to manage first aid treatment  by modelling an application (FADSS) that assists pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 19 2025
Journal Name
Journal Of Al-ma'moon College
The Rules of Conduct for Cultivated Ladies in Jane Austen's Time
...Show More Authors

There is no doubt that Jane Austen is one of the most studied authors of the late 18th and early 19th centuries. Her female characters have been extensively studied and they seem to have aroused much interest as manifestations of the conduct of their time. Her heroines have realized that there were many mistakes in the rules of conduct that controlled and restricted their behaviors. Thus, they have found no fault in correcting these mistakes, by behaving naturally without acting. Elizabeth Bennet the heroine of Pride and Prejudice and Marianne Dashwood of Sense and Sensibility are the chosen examples of that kind of women.

View Publication
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
Patterns of Feedback Used in the E-Learning System from the Teachers of the First Cycle in the Governorate of Muscat at the Sultanate of Oman
...Show More Authors

 

Abstract

This study aims to identify the degree to which the first cycle teachers use different feedback patterns in the e-learning system in addition to the differences in the degree of use according to specialization, teaching experience, and in-service training in the field of classroom assessment, as well as the interaction between them. The study sample consisted of (350) female teachers of the first cycle in government schools in Muscat Governorate for the academic year 2020/2021. The study used a questionnaire that contained four different patterns of feedback, which are reinforcement, informative, corrective, and interpretive feedback. The psychometric properties of the que

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Open Newton Contes Formula for Solving Linear Voltera Integro-Differential Equation of the First Order
...Show More Authors

  In this work, some of numerical methods for solving first order linear Volterra IntegroDifferential Equations are presented.      The numerical solution of these equations is obtained by using Open Newton Cotes formula.      The Open Newton Cotes formula is applied to find the optimum solution for this equation.      The computer program is written in (MATLAB) language (version 6)

View Publication Preview PDF
Publication Date
Wed Jan 20 2021
Journal Name
Earth And Environmental Science
Time Dependent Behavior of Engineered Cementitious Composite Concrete Produced from Portland Limestone Cement
...Show More Authors

Conventional concretes are nearly unbendable, and just 0.1 percent of strain potential makes them incredibly brittle and stiff. This absence of bendability is a significant cause of strain failure and has been a guiding force in the production of an elegant substance, bendable concrete, also known as engineered cement composites, abbreviated as ECC. This type of concrete is capable of displaying dramatically increased flexibility. ECC is reinforced with micromechanical polymer fibers. ECC usually uses a 2 percent volume of small, disconnected fibers. Thus, bendable concrete deforms but without breaking any further than conventional concrete. This research aims to involve this type of concrete, bendable concrete, that will give solut

... Show More
Publication Date
Wed Sep 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Time Dependent Behavior of Engineered Cementitious Composite Concrete Produced from Portland Limestone Cement
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes
...Show More Authors

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF