Preferred Language
Articles
/
oxf7Po8BVTCNdQwCF2Uq
PLAGIARISM DETECTION SYSTEM IN SCIENTIFIC PUBLICATION USING LSTM NETWORKS

Scopus
Publication Date
Sun Jan 01 2023
Journal Name
E3s Web Of Conferences
Mitigation of Reflection Cracking in Asphalt Concrete Overlay on Rigid Pavements

Reflective cracking is one of the primary forms of deterioration in pavements. It is widespread when Asphalt concrete (AC) overlays are built over a rigid pavement with discontinuities on its surface. Thus, this research work aims to reduce reflection cracks in asphalt concrete overlay on the rigid pavement. Asphalt Concrete (AC) slab specimens were prepared in three thicknesses (4, 5, and 6 cm). All these specimens were by testing machine designed and manufactured at the Engineering Consulting Office of the University of Baghdad to examine for the number of cycles and loads needed to propagate the reflection cracking in the asphalt concert mixture at three temperatures (20, 30, and 30°C). It was noticed that the higher thickness A

... Show More
Scopus Crossref
View Publication
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Generalizations of Fuzzy k-ideals in a KU-algebra with Semigroup
Abstract<p>We present the notion of bipolar fuzzy k-ideals with thresholds (<italic>θ, λ</italic>) of a KU-algebra with semigroup and give some basic properties of this ideal. Also, we study some relations about a bipolar fuzzy k-ideal with thresholds (<italic>θ, λ</italic>) and a k-ideal of a KU-semigroup.</p>
Scopus (3)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
A Review of Assured Data Deletion Security Techniques in Cloud Storage

      Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Randomness of Stream Cipher Digital Sequences in the Field GF(28)

     A binary stream cipher cryptosystem can be used to encrypt/decrypt many types of digital files, especially those can be considered huge data files like images. To guarantee that the encryption or decryption processes need a reasonable time to encrypt/decrypt the images, so we have to make the stream cipher key generator that acts quickly without effect in the complexity or randomness of the output key binary sequences. In this paper, we increase the size of the output sequence from binary to digital sequence in the field  to obtain byte sequence, then we test this new sequence not only as binary but also -sequence. So we have to test the new output sequence in the new mathematical field. This is done by changing the base of the

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Jan 30 2020
Journal Name
Al-kindy College Medical Journal
Role of Loop Ileostomy in the Management of Ulcerative Colitis Patients

Background: Ulcerative colitis is a chronic inflammatory condition characterized by relapsing and remitting episodes of inflammation limited to the mucosal layer of the colon.Loop ileostomy might be helpful in the management of the disease.

Objective: To evaluate the role of loop ileostomy in the management of ulcerative colitis.

 Methods: Between Januarys 2008 and January 2018, patients with fulminant ulcerative colitis resistant to medical therapy had been referred to our surgical unit and were included in our study. Assessment of the patients’ medical status (serum electrolytes, total serum protein, complete blood count, erythrocyte sedimentation rate, general stool exam,and abdominal ultrasound

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Plant Archives
The role of some cytokines in diabetic patients infected with toxoplasmosis

Toxoplasmosis is the term for infection and disease in man and animal caused by a parasite called Toxoplasma gondii. The more susceptible to infect with toxoplasmosis is the Diabetic patients, due to low level of immunity response. The aim of current study is to investigate the immune status of diabetes mellitus type 2. One hundred and seventy five samples of both diabetes mellitus type 2patients and controls which had been tested by ELISA technique to detect anti-Toxoplasma Abs (IgG and IgM). The positive toxoplasmosis samples were tested to detect the level of TNF alpha and MIG. Results for all samples clarified that seronegative for IgM antibodies while 53 (53%) diabetic patients were seropositive for IgG antibodies and for toxoplasmosis

... Show More
Scopus (2)
Scopus
Publication Date
Thu Nov 01 2018
Journal Name
Advances In Animal And Veterinary Sciences
Scopus Crossref
View Publication
Publication Date
Sun Nov 17 2019
Journal Name
Journal Of Interdisciplinary Mathematics
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jul 28 2022
Journal Name
Mechanics Based Design Of Structures And Machines
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jul 05 2023
Journal Name
Journal Of Pragmatics Research
Analysis of Impoliteness Strategies Used in Putin's Speech at Annexation Ceremony

This study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most

... Show More
Crossref
View Publication Preview PDF