Preferred Language
Articles
/
uxfZmI4BVTCNdQwCaFX0
The effect of developing the strength of the muscles of the arms and shoulders in developing the performance of some floor movements skills in artistic gymnastics for women
...Show More Authors

Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Parabola Dish and Cassegrain Concentrators to Improve Solar Cell Conversion Efficiency
...Show More Authors

New designs of solar using ray tracing program, have been presented for improved the performance and the out put power of the silicon solar cell, as well as reducing the cost of system working by solar energy. Two dimensional solar concentrator (Fresnel lenses) and three dimensional concentrators (parabola dish and cassegrain) were used as concentrator for photovoltaic applications (CPV). The results show that the performance efficiency and out power for crystalline silicon solar cells are improved.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
Integration Balanced Scorecard and technology( TDABC) technology to achieve competitive advantage
...Show More Authors

Abstract

That the reduction of costs for products and services provided by economic units is one of the main concerns at the present time to keep pace with competition in the markets, economic units are always striving to stay competitive in a modern business environment and achieve a competitive advantage, (TDABC) in the General Company for Electrical and Electronic Industries / Air cooler engine plant to reduce the costs facing the economic units under the circumstances of the Iraqi environment, especially the industrial, and the need for development events in traditional methods (TDABC) as a technology for reducing costs by relying on time guidelines. The research also concluded that the financial and non-financ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
The International Journal Of Biotechnology,
LACTIC ACID AS SPACER BETWEEN POLY ACRYLIC ACID AND 4- AMINOANTIPYRINE
...Show More Authors

Preview PDF
Publication Date
Thu Jan 24 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
On strongly E-convex sets and strongly E-convex cone sets
...Show More Authors

              -convex sets and -convex functions, which are considered as an important class of generalized convex sets and convex functions, have been introduced and studied by Youness [5] and other researchers. This class has recently extended, by Youness, to strongly -convex sets and strongly -convex functions. In these generalized classes, the definitions of the classical convex sets and convex functions are relaxed and introduced with respect to a mapping . In this paper, new properties of strongly -convex sets are presented. We define strongly -convex hull, strongly -convex cone, and strongly -convex cone hull and we proof some of their properties.  Some examples to illustrate the aforementioned concepts and to cl

... Show More
View Publication
Crossref
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Mathematics In Operational Research
A single server fuzzy queues with priority and unequal service rates
...Show More Authors

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Aug 14 2017
Journal Name
Oriental Journal Of Chemistry
Leucine Aminopeptidase from Arachis hypogaea L. Seeds Partial Purification and Characterization
...Show More Authors

Leucine amino peptidases (LAP; EC 3.4.11.1) constitute a diverse set of exopeptidases that catalyze the hydrolysis of leucine residues from the amino-terminal of protein or peptide substrates, (LAP) are present in animals, plants, and microbes. In this study, leucine amino peptidase was purified partial from Arachis hypogaea seeds by using gel filtration chromatography Sephadex G-100. The enzyme was purified 3.965 fold with a recovery of 29.4%. Its pH and temperature optimum were(8.7) and (37oC), respectively. The results show novel properties of LAP from Arachis hypogaea L. or peanut. The Km value for LAP (77 mM), with V max (1538 m mole min-1). We recommend a separate isoenzymeof the enzyme (LAP) from Arachis hypogaea on L. peanut seeds a

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Apr 30 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences (ihjpas)
Biochemical Study on Splenectomy and Non Splenectomy Iraqi Major Thalassemic Patients
...Show More Authors

Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More