Preferred Language
Articles
/
3hb7lYcBVTCNdQwC_1Z7
Pairwise connectedness in $ check ${$text ${$C$}$$}$ $ ech fuzzy soft bi-closure spaces
...Show More Authors

The concept of Cech fuzzy soft bi-closure space ( ˇ Cfs bi-csp) ( ˇ U, L1, L2, S) is initiated and studied by the authors in [6]. The notion of pairwise fuzzy soft separated sets in Cfs bi-csp is defined in this study, and various features of ˇ this notion are proved. Then, we introduce and investigate the concept of connectedness in both Cfs bi-csps and its ˇ associated fuzzy soft bitopological spaces utilizing the concept of pairwise fuzzy soft separated sets. Furthermore, the concept of pairwise feebly connected is introduced, and the relationship between pairwise connected and pairwise feebly connected is discussed. Finally, we provide various instances to further explain our findings.

Publication Date
Fri Sep 01 2023
Journal Name
Advancements In Life Sciences
Investigation of pathogenic Streptococci species in local and imported mozzarella soft cheese in Baghdad city
...Show More Authors

Background: The present work investigated the profile and biodiversity of the pathogenic streptococci species isolated from local and imported mozzarella soft cheese in Baghdad City from October 2022 to January 2023. The study aimed to examine the molecular characterization of 16Sr RNA gene in some streptococcus species isolates from mozzarella soft cheese in Baghdad city Methods: From 50 samples, 8 isolates in all were found and identified based on the VITEK, molecular, and sequencing of the 16SrRNA gene. The eight isolates represented Lactococcus cremoris. Streptococcus alactolyticus, Streptococcus sanguinis, and Streptococcus thoraltensis. The isolates were subjected to conventional PCR and electrophoresis to detect the 16SrRNA gene usi

... Show More
View Publication Preview PDF
Scopus (1)
Scopus
Publication Date
Wed Jun 04 2008
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Synthesis and characterization of new ligand c
...Show More Authors

In the present paper we report the synthesis of a new ligand [HL][(2-1-[(2-hydroxy-benzylidene)-hydrazono]-ethyl) benzene-1, 3, 5-triol and its complexes with (Mn", Fe", Cd", and Hg") The ligand was prepared in two steps. In the first step a solution of salicylaldehyed in methanol reacted under reflux with hydrazinemonohydrate to give an intermediate compound which reacted in the second step with 2, 4, 6-trihydroxidernonohydrate giving the tientioned ligand. The complexes were synthesis by direct reaction of the corresponding metal chloride with ligand. The ligand and the complexes have been characterized by spectroscopic methods [" H NMR, IR, UV-Vis,, atomic absorption], HPLC microanalysis along with conductivity measurements. From the abo

... Show More
Publication Date
Wed Feb 28 2024
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
The Effects of -806 T/C and -857 T/C Single Nucleotide Polymorphisms in the TNF-α Gene on Rheumatoid Arthritis Severity and Inflammatory Markers
...Show More Authors

Background: Polymorphisms in the TNF-α gene affect the development and progression of rheumatoid arthritis. Objective: To investigate the associations between (-806 T/C) and (-857 T/C) SNPs with rheumatoid arthritis severity and susceptibility in a sample of Iraqi patients. Methods: A case-control study was conducted in Baghdad, Iraq. Twenty healthy controls and 63 patients confirmed to be newly diagnosed with rheumatoid arthritis were included. Those are divided into two groups (patients and controls), and the patients were further subdivided into severe and mild-moderate groups. Samples from those participants were analyzed for clinical and inflammatory parameter measurements. Genotyping by the Sanger method was performed to stu

... Show More
View Publication
Publication Date
Tue Jan 04 2022
Journal Name
Iraqi Journal Of Science
Text Compression & Encryption Method Based on RNA and MTF
...Show More Authors

The sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.

View Publication Preview PDF
Publication Date
Wed Feb 16 2022
Journal Name
Iraqi Journal Of Science
Text Steganography Method Based On Modified Run Length Encoding
...Show More Authors

Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on som

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Fast Text Analysis Using Symbol Enumeration and Hashing Methodology
...Show More Authors

This paper is focusing on reducing the time for text processing operations by taking the advantage of enumerating each string using the multi hashing methodology. Text analysis is an important subject for any system that deals with strings (sequences of characters from an alphabet) and text processing (e.g., word-processor, text editor and other text manipulation systems). Many problems have been arisen when dealing with string operations which consist of an unfixed number of characters (e.g., the execution time); this due to the overhead embedded-operations (like, symbols matching and conversion operations). The execution time largely depends on the string characteristics; especially its length (i.e., the number of characters consisting

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 28 2003
Journal Name
Journal Of Engineering
STABILITY OF UNREINFORCED AND REINFORCED EMBANKMENTS ON SOFT SOILS
...Show More Authors

Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Reducing settlement of soft clay using different grouting materials
...Show More Authors
Abstract<p>Different injection material types were tried in the injection of soft clay, such as lime (L), silica fume (SF), and leycobond-h (LH). In this study, experiments were made to study the effect of injection on soft clay consolidation settlement. A sample of natural soft clayey soil was investigated in the laboratory and the sample was injected with each of the grout materials used, L, SF, L + SF, and L + SF + LH. A 20 cm<sup>3</sup> of each slurry grout was conducted into the soil, which was compacted in California Bearing Ratio (CBR) mold and cured for 7 days, and then the sample was loaded to 80 N load by a circular steel footing 60 mm in diameter. The settlement was r</p> ... Show More
View Publication
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref