Preferred Language
Articles
/
BheML48BVTCNdQwCuF5F
Sex identification of date palm by using dna molecular markers
...Show More Authors

Publication Date
Tue Jan 01 2008
Journal Name
J Bagh College Of Dentistry
Assessment of consistency and compressive strength of glass ionomer reinforced by different amount of hydroxyapatite
...Show More Authors

Background: Glass ionomers have good biocompatibility and the ability to adhere to both enamel and dentin. However, they have certain demerits, mainly low tensile and compressive strengths. Therefore, this study was done to assess consistency and compressive strength of glass ionomer reinforced by different amount of hydroxyapatite. Materials and Methods: In this study hydroxyapatite materials were added to glass ionomer cement at different ratios, 10%, 15%, 20%, 25% and 30% (by weight). The standard consistency test described in America dental association (ADA) specification No. 8 was used, so that all new base materials could be conveniently mixed and the results would be of comparable value and the compressive strength test described by

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Science
Investigation of nanostructured and gas sensing of tin dioxide films prepared by oxidation of Sn
...Show More Authors

Publication Date
Thu Sep 01 2022
Journal Name
Neuroquantology
Evaluation of using of square flap in treatment of Postburn Contracture
...Show More Authors

Background: One of the most common problems that encountered is postburn contracture which has both functional and aesthetic impact on the patients. Various surgical methods had being proposed to treat such problem. Aim: To evaluate the effectiveness of square flap in management of postburn contracture in several part of the body. Patients and methods: From April 2019 to June 2020 a total number of 20 patients who had postburn contracture in various parts of their body were subjected to scar contracture release using square flap. The follow up period was ranging between 6 months to 12 months. Results: All of our patients had achieved complete release of their band with maximum postoperative motion together with accepted aesthetic outcome. A

... Show More
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Scope of using accounting of responsibility under contition of public badget
...Show More Authors

Abstract

  The public budget in Iraq is still prepared according to the traditional base that allocates the  amounts of budget the current year based on the budget of previous year with an increase in estimations with random proportions without connecting the input (financial, human resources and asset )with their output (quantitatively and qualitatively)this caused waste and lose in the available resources therefore the output of budget showed be adapted is such a way that achieving connection between its input and output and to be appropriate with the organizational structure of the state without intrinsic change in its work .this may be realized by adopting the accounting of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
The Aesthetic Dimension in Popular Topics by Naguib Younes
...Show More Authors

The aesthetic dimension in popular subjects is one of the important topics in the history and culture of peoples, as it is the vessel from which their faith, traditions, original values, language, ideas, practices and way of life are derived, which expresses their culture and national identity, and it is the bridge of communication between generations throughout the ages.

It is one of the main pillars in the process of development and development, and popular subjects have special images related to real daily life, and they are the best source for man to narrate through him in his portrayal of daily life in general, and for the artist in particular, who is part of this daily life and its vocabulary, as he interacts with it so that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Ecological Engineering
Cadmium Removal from Contaminated Soil by Electro-Kinetic Method
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Online Journal Of Veterinary Research
Article review: Infections by gram + bacteria in laboratory mice
...Show More Authors

Publication Date
Sun Dec 01 2013
Journal Name
Al- Mustansiriyah Journal Science
Convex Approximation by q- Meyer-König-Zeller Durrmeyer Operators
...Show More Authors

Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More