Preferred Language
Articles
/
BhbsGYcBVTCNdQwCRje-
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Physics: Conference Series
Study the effect of gamma Irradiation on the Superconducting Properties of HgBaSrCa<sub>2</sub>Cu<sub>3</sub>O<sub>8+δ</sub>
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Sep 05 2021
Journal Name
Journal Of Arab Statistical Union (jasu)
Using Quality Control and 6-Sigma to Determine The Quality of The Treated Wastewater Discharged From Some Water Purification Plants
...Show More Authors

Publication Date
Fri May 01 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Relationship of some fitness elements with the performance of lifting the iron ball (weight) by gliding method
...Show More Authors

AS Muhsen, International Journal of Psychosocial Rehabilitation (1475-7192), 2020 - Cited by 1

View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
Sensitize the electrical properties of partial substitution on mercury-base superconductor manufactured by the solid reaction method
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Conflict management and its relation to functional performance as perceived by secondary school managers toward the directors of directorates of education in wassat province
...Show More Authors

The research aims to; identify the management of conflict as perceived by secondary school managers toward the directors of directorates of education in wassat province, identify functional performance as perceived by secondary school managers toward the directors of directorates of education in wassat province. Besides, explore the relationship between Conflict management and functional performance among the directors of directorates of education in wassat province. A descriptive approach deemed more appropriate with study design. As a tool to collect the data of current research, the author used a questionnaire. Spss tools were used for data analysis

View Publication Preview PDF
Publication Date
Wed Jan 02 2019
Journal Name
International Journal Of Agricultural & Statistical Sciences
RESPONSE OF OLIVE SEEDLINGS TO HUMIC ACID AND INOCULATION BY FUNGI (TRICHODERMA SSP) AND THE INTERACTION OF THEM AND IRRIGATION BY SALT WATER ON VEGETATIVE GROWTH.
...Show More Authors

Publication Date
Sat Mar 31 2007
Journal Name
Um-salama Science Journal
Synthesis and Characterization of the Heavy Metals; Au(III), Pd(II), Pt(IV) and Rh(III) Complexes of S-Propynyl 2-Thiobenzimidazole
...Show More Authors

Complexes of Au (III), Pd (II), Pt (IV ) and Rh(III) with S–propynyle-2- thiobenzimidazole (BENZA) have been prepared and characterized by IR and UV- Visible spectral methods in addition to magnetic and conductivity measurements and micro–elemental analysis (CHN).The probable structures of the new complexes have been suggested.

Preview PDF
Publication Date
Fri Feb 28 2025
Journal Name
Moroccan Journal Of Chemistry
Design, Synthesis, and Biological Evaluation of new sulfonamides derived from 2-Aminopyridine: Molecular docking, POM analysis, and identification of the pharmacophore sites
...Show More Authors

New series of imidazole[1,2-a]pyridine-sulfonamides was designed and synthesized from 2-aminopyridine, which was reacted with p-bromo phenacyl bromide in the present of MgO to produce the corresponding imidazole[1,2-a]pyridine, which was then reacted with chlorosulfonic acid to produce 2-(4-bromophenyl)imidazole[1,2-a]pyridine-3-sulfonyl chloride [2]. Following that, treatment of (2) with different amines using the grand method to generate imidazole [1,2-a] pyridine sulfonamides. All the synthesized compounds have been characterized by FTIR, 1HNMR and 13CNMR and C.H.N analysis. The DFT, POM analysis and molecular docking were carried out on for all final compounds to investigate drug like attributes, and the results revealed showed that the

... Show More
Scopus (6)
Scopus
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
Indirect Method for Optimal Control Problem Using Boubaker Polynomial
...Show More Authors

In this paper, a computational method for solving optimal problem is presented, using indirect method (spectral methodtechnique) which is based on Boubaker polynomial. By this method the state and the adjoint variables are approximated by Boubaker polynomial with unknown coefficients, thus an optimal control problem is transformed to algebraic equations which can be solved easily, and then the numerical value of the performance index is obtained. Also the operational matrices of differentiation and integration have been deduced for the same polynomial to help solving the problems easier. A numerical example was given to show the applicability and efficiency of the method. Some characteristics of this polynomial which can be used for solvin

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More