Preferred Language
Articles
/
ChYFoooBVTCNdQwCIqKa
Synthesis, characterization and Study Bioactivity of Silver Nanocomposites
...Show More Authors

The work include synthesis of nanocomposites (X / S / Ag) based on blend from Xanthan gum / sodium alginate polymers (X / S) with different loading of synthesized silver nanoparticales (0.01, 0.03 and 0.05 wt%) were added to the blend. The silver nanoparticles were prepared by reduction method and were characterized and analyzed using X-ray diffraction (XRD) and Atomic force microscope (AFM). XRD study showed the presence nanoparticle of silver with crystalline nature and face-centered cubic (FCC) structure and an average size of nanoparticles ranging from 32 to 37 nm. The surface study was performed using AFM which showed a fairly uniform shape to the nanocomposites and a spherical nature for the silver nanoparticles. The nanocomposite exhibited increase in the thermal stability and as well (X / S /0.05 Ag) nanocomposite film showed superior antimicrobial activity against Proteus, Basileus cyrus, Ecole, staph, pseudomonas, and Basilus subtilius.

Scopus Crossref
Publication Date
Thu Oct 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
ENGLISH FOR SPECIFIC PURPOSES (ESP) AND SYLLABUS DESIGN
...Show More Authors

This research has discussed the origins of ESP, addressed key notions about ESP and examined issues in ESP syllabus design. The content of the paper was determined by a need identified based on my  experience as an ESL instructor designing and delivering the content-based language program - Language Preparation for the Cadets and Employment in the Iraqi  College of Police . These issues, where possible, have been supported by current and pertinent academic literature. It is my sincerest hope that these observations will lend insight into the challenges facing the ESL instructor acting as ESP syllabus developer.

View Publication Preview PDF
Publication Date
Fri Mar 29 2024
Journal Name
Iraqi Journal Of Science
Electron Scattering from Stable and Exotic Li Isotopes
...Show More Authors

     The nuclear shell model was used to investigate the bulk properties of lithium isotopes (6,7,8,9,11Li), i.e., the ground state density distributions and C0 and C2 components of charge form factors. The theoretical treatment was based on supposing that the Harmonic-oscillator (HO) potential governs the core nucleons while the valence nucleon(s) move through Hulthen potential. Such assumptions were applied for both stable and exotic lithium isotopes. The HO size parameters (  and ), the core radii ( ) and the attenuation parameters (  and ) were fixed to recreate the available empirical size radii for lithium isotopes under study.

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 29 2019
Journal Name
Journal Of Planner And Development
War disasters and their effects on urban structure
...Show More Authors

Many urban and rural areas fall under the impact of disasters, whether natural or industrial, and with increasing complexity in urban areas, with diversity of economic, social and political components, and technological and cognitive development, the effects of disasters and wars have increased with the time, where disasters are affecting all aspects of life, causing great waste of property and lives, also displacement of populations and disruption of economic life, these effects are multiplied if they are not dealt with in sound curricula and scientific strategies.

The research aims to identify the experiences of some countries and their strategies and effective programs in reconstruction after exposure to disasters and wars wit

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
International and Regional Competition for the African Coast
...Show More Authors

This study aimed at analyzing and studying the strategic and geopolitical importance of the Sahel region, which increased the regional competition for the resources of the region, especially the energy resources that have been and continue to be one of the axes of conflict and competition between these forces.
The researcher tried to review the competition between the international force, France, the United States of America, China, Algeria and Libya, and the African coast. We note that there is a positive correlation between the severity of the conflict and the intensity of the competition of the major powers to control the countries of the region and the extent of political and economic stability These countries are directly affecte

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Bionatura
Geological and Plant Diversity in Hawizeh Marshes, Iraq
...Show More Authors

Scopus
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Engineering
Gas Adsorption and Storage at Metal-Organic Frameworks
...Show More Authors

Dry gas is considered one of the most environmentally friendly sources of energy. As a result, developing an efficient strategy for storing this gas has become essential. In this work, MOF-199 was synthesized and characterized in order to investigate the MOF-199 in dry gas adsorption using a built-in volumetric system (methane, ethane, and propane from Basrah gas company). The MOF-199 (metal organic framework) was synthesized using the solvothermal method at 373K for 24h, and then it was characterized. The dry gas adsorption on MOF-199 was studied under various conditions (adsorbent dosage, contact time, temperature, and pressure). The isothermal adsorption of the dry gas had been studied on MOF-199 using two types of mo

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of The College Of Education For Women
Deception in Amber Heard and Johnny Depp’s Trials
...Show More Authors

Deception is defined as a linguistic and non-linguistic behavior that is used in interaction in order to make the addressees believe what is believed to be false or lack evidence. McCornack (1992) classifies deception into four manipulative strategies (i.e., fabrication, distortion, equivocation and concealment), other scholars argue that deception encompasses the strategies of “fabrication (outright lying), equivocation (being vague and ambiguous), or concealment (with holding relevant information) Thus, the present study investigates the deception strategies and motives that are used by Johnny Depp and Amber Heard during their defamation trials. Qualitative and quantitative methods are employed when analyzing the data in question. Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 07 2012
Journal Name
Journal Of Educational And Psychological Researches
Bullying and its relation to parental treatment style
...Show More Authors

The current research aims to know the relationship between bullying and parental treatment. (200) pupils were selected randomly from the fifth and sixth grades of primary schools.

Two instruments were used. The first was to measure bullying and it included 19 items. To measure parental treatment, the researchers adopted (Aletaby 2001) scale.

Statistical analysis showed that correlation between bullying , wiggle and Firm treatment style was positive Statistically significant .Bulling was correlated negatively with (neglect, careless, and Authoritarian treatment style.

View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
European Journal Of Pure And Applied Mathematics
e*-Essential small submodules and e*-hollow module
...Show More Authors

Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref