Preferred Language
Articles
/
Axdbdo4BVTCNdQwCZUlF
Standard Criteria for Some Special Abilities as Indicator for Selecting Iraqi Club's Weightlifters Aged 14 – 16 years Old
...Show More Authors

View Publication
Publication Date
Sun May 07 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETECTION OF MINERAL AND MICROBIAL CONTAMINATION IN CEREAL AND IT,S PRODUCTS: DETECTION OF MINERAL AND MICROBIAL CONTAMINATION IN CEREAL AND IT,S PRODUCTS
...Show More Authors

The results shows existence of metals such as copper, iron, Cadmium, lead and zinc in most of examined samples , the highest concentration are up to (2.26, 40.82, 282.5, 31.02, 19.26, 4.34) Part per million) ppm) in pasta hot (Zer brand), Indomie with chicken, granule (Zer brand), brand (Zer brand), and rice (mahmood brand) respectively, with presence nickel in spaghetti( Zer brand), granule, Zer brand with concentration reached to 4.34 ppm and 1.06 ppm respectively.
The results of cereals group and its products show that two kinds of fungi, Aspergillus spp. and Penicillin spp. were found in rice (Mahmood brand) with numbers got to 1.5×103 Colony Forming Unit/ gram (c.f.u./g),while Bacillus cereus and Staphylococcus aureus were isola

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Sun Nov 18 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Comparison Between Standard Bayes Estimators of the Reliability Function of Exponential Distribution
...Show More Authors

   In this paper, a Monte Carlo Simulation technique is used to compare the performance of the standard Bayes estimators of the reliability function of the one parameter exponential distribution .Three types of loss functions are adopted, namely, squared error  loss function (SELF) ,Precautionary error loss function (PELF) andlinear exponential error  loss function(LINEX) with informative and non- informative prior .The criterion integrated mean square error (IMSE) is employed to assess the performance of such estimators

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Nov 15 2022
Journal Name
Nasaq Journal
Componential Analysis of Hatred Synonymy in the Lexicons of English and Standard Arabic
...Show More Authors

ABSTRACT This paper has a three-pronged objective: offering a unitary set of semantic distinctive features to the analysis of nominal “hatred synonyms” in the lexicon of both English and Standard Arabic (SA), applying it procedurally to test its scope of functionality crosslinguistically, and singling out the closest noun synonymous equivalents among the membership of the two sets in this particular lexical semantic field in both languages. The componential analysis and the matching procedures carried have been functional in identifying ten totally matching equivalents (i.e. at 55.6%), and eight partially matching ones (i.e. at %44.4%). This result shows that while total matching equivalences do exist in the translation of certain Eng

... Show More
View Publication
Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Simultaneous Quantitative Determination of Ciprofloxacin and Hydrocortisone by H-Point Standard Addition Method
...Show More Authors

Ciprofloxacin (Cip) and hydrocortisone (Hyd) were simultaneously measured as hydrochloride and sodium succinate, respectively, using the H-point standard addition method (HPSAM). The approach can precisely identify Cip in the presence of Hyd with various analyte-to-interference ratios (5:5, 5:10, 10:5, 10:10) µg.mL-1, in mixed samples containing (1-5µg.ml-1) of Cip, at the wavelengths of (236 and 257) nm. In the same way, Hyd was analyzed in the presence of Cip in different analytes with an interference ratio of (5:5, 5:10, 10:5, 10:10) µg.mL-1, in mixed samples containing (1-5 µg.mL-1) of Hyd, at wavelengths of (266 and 278) nm. The satisfactory results show good reproducibility of the dev

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 12 2019
Journal Name
Al-kindy College Medical Journal
Minimal sternotomy surgery in comparison to standard sternotomy in the coronary bypass Surgery
...Show More Authors

Background Median sternotomy is the gold standard incision for most cardiac operations. However, with the advent of minimal invasive surgery, a new approach emerged in cardiac surgery named mini-sternotomy and has been successfully used to perform a variety of operations.

 The aim of this paper is to present our experience of using mini-sternotomy to harvest the left internal mammary artery (LIMA) for off-pump revascularization of the left anterior descending artery (LAD)

 Methodology Over a 2-year period (October 2012-October 2014), 100 patients underwent coronary artery bypass grafting (CABG) via conventional median sternotomy (CMS) (n=80) and mini-sternotomy (MS) (n=20). The

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Current Research In Microbiology And Biotechnology
Cytogenetic Analysis for the Effect of Alcoholic and Water Extracts of Iraqi Propolis in Mice
...Show More Authors

This study was conducted to study the cytogenetic effect of both alcoholic and water extracts of propolis on mice. Three different samples of propolis were collected from three different regions of Iraq (Najaf, Arbil and Baghdad) to be used in this study. The cytotoxic effect of two different doses of each extracted sample was measured by employing cytogenetic analysis which included (mitotic index (MI), chromosomal aberrations (CAs), micronucleus index (MN) and sperm abnormalities). Results showed that significant increase in MI and significant reduction in MN, CAs and sperm abnormalities percentage were seen after treatment with both alcoholic and water extract of the three samples when compared with negative control, and alcoholic extrac

... Show More
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effect of risk selection policy for life insurance on the prodectivity of iraqi insurance company
...Show More Authors

The life insurance companies need a sound system to use it in selecting Insurable risks so they can avoid or reduce possible losses that may be insured to a minimum levels , But the application within IRAQI INSURANCE  COMPANY reflects that it still depends on a traditional ways in the procedures used to select that risks .

                 This  research represents an attempt to put acceptable suggestions about developing a system for selecting insurable risks which used now by iraqi insurance company by recognizing the risks of life insurance , determining kinds of risks which can difined as normal and upnormal risks , rectification of the

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effect of Continuous Improvement in Achieving Competitive Advantage for Iraqi Universities: And Their Research Projects
...Show More Authors

The rapid change in economic is a serious challenge facing all countries around the world, even developed ones. This challenge is increasing as the world enters the age of knowledge in which different knowledge and technologies have emerged and the distance between the emergence of scientific knowledge and its actual application on the ground has been reduced as well as the growing role of science and technology in community development. One of the most important technology amongst these technologies is nanotechnology, where this technology plays a major role in the development of products and modern devices and reduces cost with quality improvement. This technology is cross-cultural, requires a comprehensive knowledge structure and depe

... Show More
View Publication Preview PDF
Crossref