Preferred Language
Articles
/
mhhLFpcBVTCNdQwClJVS
A New Class of Higher Derivatives for Harmonic Univalent Functions Established using a Generalized Fractional Integral Operator
...Show More Authors

A new class of higher derivatives  for harmonic univalent functions defined by a generalized fractional integral operator inside an open unit disk E is the aim of this paper.

Crossref
View Publication
Publication Date
Thu Dec 09 2021
Journal Name
Revista Latinoamericana De Hipertension
Synthesis, chemical hydrolysis and biological evaluation of doxorubicin carbamate derivatives for targeting cancer cell
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Synthesis of substituted (oxazepine, Diazepine, tetrazde) via Schiff Bases for 2- Aminobenzo Thaizole Derivatives
...Show More Authors

This work includs synthesis of several Schiff bases by condensation of 6- methoxy – 2- amino benzothiazole with some aldehydes and ketones (2- hydroxyl benzaldehyde, 4- hydroxyl benzaldehyde, 4- N,N –dimethy amino acetophenone, benzophenone) to abtain schiff bases (1-5). These schiff bases were found to react with phthalate anhydride to give oxazepine derivatives (6-10) that were reacted with primary aromatic amines to give Diazepine derivatives (11-15). Besides, we prepared new tetrazole derivatives (16-20) from the reaction of the prepared Schiff bases with sodium azide in the prepared compounds that were characterized by physical properties, FT-IR and some of the 1H-NMR and 13C –NMR spectroscopy.

View Publication Preview PDF
Crossref
Publication Date
Mon Aug 04 2014
Journal Name
Iraqi National Journal Of Chemistry
Comparative Study for Antibacterial Activity of Some Maleamic acid Derivatives with Some Commercial Antibiotic
...Show More Authors

Publication Date
Fri Mar 29 2024
Journal Name
Iraqi Journal Of Science
The Simulation Technique to Estimate the Parameters of Generalized Exponential Rayleigh Model
...Show More Authors

     The paper shows how to estimate the three parameters of the generalized exponential Rayleigh distribution by utilizing the three estimation methods, namely, the moment employing estimation method (MEM), ordinary least squares estimation method (OLSEM),  and maximum entropy estimation method (MEEM). The simulation technique is used for all these estimation methods to find the parameters for the generalized exponential Rayleigh distribution. In order to find the best method, we use the mean squares error criterion. Finally, in order to extract the experimental results, one of object oriented programming languages visual basic. net was used

View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Generating a Strong Key for a Stream Cipher Systems Based on Permutation Networks
...Show More Authors

The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.

View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Gender Recognition Using a Multilayer Feature Extraction Method
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 31 2024
Journal Name
Journal Of Soft Computing And Computer Applications
Enhancing Image Classification Using a Convolutional Neural Network Model
...Show More Authors

In recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.

... Show More
View Publication
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Age Estimation Using a Ranking Convolutional Neural Network
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Fractal Image Compression Using Block Indexing Technique: A Review
...Show More Authors

Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima

... Show More
Preview PDF
Crossref (1)
Crossref