Preferred Language
Articles
/
nhcNS5MBVTCNdQwC3NBq
Intrinsic Control Strategies for Herpesvirus-based Vaccine Vectors
...Show More Authors

Publication Date
Sun Mar 18 2018
Journal Name
Https://www.iasj.net/iasj/article/170012#:~:text=al.qadisiya%20journal%20for%20the%20sciences%20of%20physical%20education
The Effect Of Using Two Strategies For Active Learning ( Jigsaw Strategy & Problems Solving) In Learning Some Balanced Beam's Skills In Artistic Gymnastics
...Show More Authors

The aim of this study to identify the effect of using two strategies for active learning ( Jigsaw Strategy & Problems Solving) in learning some balanced beam's skills in artistic gymnastics for women , as well as to identify the best of the three methods (jigsaw strategy , problems solving and the traditional method) in learning some skills balance beam , the research has used the experimental methodology, and the subject included the students of the college of Physical Education and Sports Sciences / University of Baghdad / third grade and by the lot was selected (10) students for each group of groups Search three and The statistical package for social sciences (SPSS) was used means, the standard deviation and the (T.test), the one way a n

... Show More
Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
The efficiency of Using Attribute and Performance- Based Activity Methods to Raise the Level of Control Deviation A field study in Jaber Bin Hayyan Factory
...Show More Authors

Cost is the essence of any production process for it is one of the requirements for the continuity of activities so as to increase the profitability of the economic unit and to support the competitive situation in the market. Therefore, there should be an overall control to reduce the cost without compromising the product quality; to achieve this, the management should have detailed credible and reliable information about the cost to be measured, collected, understood and to analyze the causes for the spread of deviations and obstacles the management faces, and to search for the factors that trigger the emergence of these deviations and obstacles

View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2010
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
PC-Based Controller for Shell and Tube Heat Exchanger
...Show More Authors

PC-based controller is an approach to control systems with Real-Time parameters by controlling selected manipulating variable to accomplish the objectives. Shell and tube heat exchanger have been identified as process models that are inherently nonlinear and hard to control due to unavailability of the exact models’ descriptions. PC and analogue input output card will be used as the controller that controls the heat exchanger hot stream to the desired temperature.
The control methodology by using four speed pump as manipulating variable to control the temperature of the hot stream to cool to the desired temperature.
In this work, the dynamics of cross flow shell and tube heat exchanger is modeled from step changes in cold water f

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Lecture Notes In Networks And Systems
Symlet Analysis for ECG-Based Diagnosis of Heart Dysfunction
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Partial Encryption for Colored Images Based on Face Detection
...Show More Authors

Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Polymer electrolytes based PAN for dye-sensitized solar cells
...Show More Authors

Solar cells has been assembly with electrolytes including I−/I−3 redox duality employ polyacrylonitrile (PAN), ethylene carbonate (EC), propylene carbonate (PC), with double iodide salts of tetrabutylammonium iodide (TBAI) and Lithium iodide (LiI) and iodine (I2) were thoughtful for enhancing the efficiency of the solar cells. The rendering of the solar cells has been examining by alteration the weight ratio of the salts in the electrolyte. The solar cell with electrolyte comprises (60% wt. TBAI/40% wt. LiI (+I2)) display elevated efficiency of 5.189% under 1000 W/m2 light intensity. While the solar cell with electrolyte comprises (60% wt. LiI/40% wt. TBAI (+I2)) display a lower efficiency of 3.189%. The conductivity raises with the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Materials Research Express
SiC composite based selective electromagnetic propagation for GHz application
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref