Preferred Language
Articles
/
jnhm-78
TWO NEW RECORDS OF DWARF SNAKES OF THE GENUS EIRENIS JAN, (REPTTILIA, COLUBRIDAE) IN IRAQI KURDISTAN (NORTH AND NORTHEASTERN OF IRAQ) WITH ANNOTATED CHECKLIST, FOR THE GENUS EIRENIS IN IRAQ
...Show More Authors

    Two dwarf snakes were discovered, Eirenis thospitis Schmidtler & Lanza from Sereen mountain, north east of Arbil  and E. rothii Jan from Saffin mountain North of Arbil  city  North of Iraqi Kurdistan. Supported by description and important notes on variation. In addition summarized list for 9 species of the genus Eirenis Jan in Iraq is also presented.  

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Stamps extraction using local adaptive k- means and ISODATA algorithms
...Show More Authors

<span>One of the main difficulties facing the certified documents documentary archiving system is checking the stamps system, but, that stamps may be contains complex background and surrounded by unwanted data. Therefore, the main objective of this paper is to isolate background and to remove noise that may be surrounded stamp. Our proposed method comprises of four phases, firstly, we apply k-means algorithm for clustering stamp image into a number of clusters and merged them using ISODATA algorithm. Secondly, we compute mean and standard deviation for each remaining cluster to isolate background cluster from stamp cluster. Thirdly, a region growing algorithm is applied to segment the image and then choosing the connected regi

... Show More
View Publication
Scopus (13)
Crossref (4)
Scopus Crossref
Publication Date
Sun Nov 12 2023
Journal Name
Migration Letters
Piezoelectric Energy Harvesting from Vortex-Induced Vibrations: Design and Correlations
...Show More Authors

This study delves into the design optimization of a hydropower harvesting system, exploring various parameters and their influence on system performance. By modifying the variables within the model to suit different flow conditions, a judiciously optimized design is attainable. Notably, the lift force generated is found to be intricately linked to the strategic interplay of the bluff body's location, cylinder dimensions, and flow velocity. The findings culminate in the establishment of empirical equations, one for lift force and another for displacement, based on the force equation. Many energy harvesting approaches hinge on the reciprocating motion inherent to the structural system. The methodology developed in this study emerges as a pot

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research &amp; Development
Anterior Loop Presence and Extension Using Cone-Beam Computed Tomography
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Strongly F – Regular Modules and Strongly Pure Intersection Property
...Show More Authors

A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
Some Results about Acts over Monoid and Bounded Linear Operators
...Show More Authors

This study delves into the properties of the associated act V over the monoid S of sinshT. It examines the relationship between faithful, finitely generated, and separated acts, as well as their connections to one-to-one and onto operators. Additionally, the correlation between acts over a monoid and modules over a ring is explored. Specifically, it is established that  functions as an act over S if and only if  functions as module, where T represents a nilpotent operator. Furthermore, it is proved that when T is onto operator and  is finitely generated, is guaranteed to be finite-dimensional. Prove that for any bounded operator the following,  is acting over S if and only if  is a module where T is a nilpotent operator, is a

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sat Jul 01 2017
Journal Name
International Journal Of Science And Research (ijsr)
Post Cesarean Section Surgical Site Infection; Incidence and Risk Factors
...Show More Authors

The rate of births delivered by cesarean section (CS) has gone up substantially all over the world. Post-cesarean surgical site infection (SSI) is a common cause of maternal morbidity and mortality that results in prolonged period of hospitalization with increased cost and direct health implications, especially in low socioeconomic population, resource- restricted settings, and war- related conditions with internal forced movement. This study was aimed to find incidence of post cesarean section surgical site infection withthe accompanying risk factors.Pregnant ladies admitted to department of obstetrics and gynecology at Medical City Hospital in Baghdad who had undergone CSs were followed up prospectively from first of January 2017 till end

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 16 2022
Journal Name
Methods In Molecular Biology
Fluorescent Proteins: Crystallization, Structural Determination, and Nonnatural Amino Acid Incorporation
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Jan 08 2023
Journal Name
Journal Of Planner And Development
Lebanese building law between texts, Application gaps and land scarcity
...Show More Authors

This paper examines the gaps in Lebanese building law as well as the exploitation of contractors, stakeholders, and residents in order to make illegal profits at the expense of The Shape of urban agglomerations and their expansion in cities and rural areas, which is contrary to the principles of sustainable land development. It also emphasizes the amplification of the factors of vertical and horizontal building investments in the implementation of buildings contrary to the license, as well as the burden that this places on the city's resulting infrastructure and ability to absorb the activities and needs of its residents. The study then presents recommendations in the process of transformation in the technique of planning and application

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref