Preferred Language
Articles
/
GRb7dYcBVTCNdQwCEVMK
Theoretical Discussion of Electron Transport Rate Constant at TCNQ / Ge and TiO<sub>2</sub> System
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Iraqi Journal Of Agricultural Sciences
Effect of cultural media and nutrient solution on quality and production of cucumber by using hydroponic system.
...Show More Authors

Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
ThermodynamicProperties of Nicotinicacid in Dilute HCl and inaqueous NaCl solutions at (293.15, 298.15, 303.15 and 308.15)K
...Show More Authors

Apparent molar volume, V?, and viscosity B-coefficient of nicotinc acid in water and in aqueous NaCl solutions have been determined from density and viscosity measurements at (293.15, 298.15, 303.15 and 308.15) K. The experimental density data were evaluated by Masson equation, and the derived, apparent molar volume at infinite dilution, Vo?, and the slope Sv, were interpreted in term of solute-solvent and solute- solute interactions. Transfer apparent molar volumes at infinite dilution of nicotinic acid from water to NaCl solutions at various temperatures have been calculated.The viscosity data have been analyzed using Jones-Dole equation, and the derived parameters, Jones-Dolecoefficient, B,and Falkenhagen coefficient,A, have been also in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 30 2018
Journal Name
Oriental Journal Of Chemistry
Viscosity and Density Studies of Drugs in Aqueous Solution and in Aqueous Threonine Solution at 298.15 K
...Show More Authors

Viscosities (η) and densities (ρ) of atenolol and propranolol hydrochloride in water and in concentrations (0.05 M) and (0.1 M) aqueous solution of threonine have been used to reform different important thermodynamic parameters like apparent molal volumes fv partial molal volumes at infinite dilution fvo , transfer volume fvo (tr), the slop Sv , Gibbs free energy of activation for viscous flow of solution ΔG*1,2 and the B-coefficient have been calculated using Jones-Dole equation. These thermodynamic parameters have been predicted in terms of solute-solute and solute-solvent interaction.

Publication Date
Sat Jul 01 2023
Journal Name
Chemical Methodologies
Acid Activation of Iraqi Bentonite Clay and Studying its Structural, Dielectric and Electrical Behavior at Various Temperatures
...Show More Authors

Iraqi calcium bentonite was activated via acidification to study its structural and electrical properties. The elemental analysis of treated bentonite was determined by using X-ray fluorescence while the unit crystal structure was studied through X-ray diffraction showing disappearance of some fundamental reflections due to the treatment processes. The surface morphology, on the other hand, was studied thoroughly by Scanning Electron microscopy SEM and Atomic Force Microscope AFM showing some fragments of montmorillonite sheets. Furthermore, the electrical properties of bentonite were studied including: The dielectric permittivity, conductivity, tangent loss factor, and impedance with range of frequency (0.1-1000 KHz) at different temperatu

... Show More
Publication Date
Tue Dec 28 2010
Journal Name
Iraqi Postgraduate Medical Journal
Knowledge and preference of mothers delivering at ALKadhumyia Teaching Hospital regarding caesarean section and normal vaginal delivery
...Show More Authors

Publication Date
Mon Feb 25 2019
Journal Name
Oriental Journal Of Chemistry
Viscosity and Density Studies of Drugs in Aqueous Solution and in Aqueous Threonine Solution at 298.15 K
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Fri Aug 01 2014
Journal Name
International Journal Of Engineering And Innovative Technology (ijeit)
New Predictive Block Matching Searching Algorithms and Hybrid Predictive Search System
...Show More Authors

In this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Hijab and Burqa in Islamic Fashion System: فرات جمال حسن العتابي
...Show More Authors

Most of the propositions and researches that dealt with fashions in the Middle East, specifically this region from the world, from a historical perspective have not been sufficient, and were characterized by many aspects of immature thinking, in addition, they have been varied in quality. This can be attributed to many factors including: the focus in the field of researches and Middle East studies is on languages, arts, history, and political thinking of the region. Other factors are the information asymmetry, the differences in sources and references, in addition to differences in the scientific value of these sources added to the difficulty of gathering them at the same time especially that these sources are scattered in many places wh

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Tue Jan 17 2012
Journal Name
Journal Of The College Of Basic Education
Image Retrieval Using DCT/KWT and D4/KWT in Distributed System
...Show More Authors

This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff

... Show More
Preview PDF