Preferred Language
Articles
/
RhavuocBVTCNdQwCG1-b
Cloud computing sensitive data protection using multi layered approach
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Wed May 01 2024
Journal Name
Journal Of Physics: Conference Series
Study of The Effect of Concentration on The Efficiency of The Sensitive N749-TiO<sub>2</sub> Solar Cell
...Show More Authors
Abstract<p>In this research, we studied the effect of concentration carriers on the efficiency of the N749-TiO<sub>2</sub> heterogeneous solar cell based on quantum electron transfer theory using a donor-acceptor scenario. The photoelectric properties of the N749-TiO<sub>2</sub> interfaces in dye sensitized solar cells DSSCs are calculated using the J-V curves. For the (CH3)3COH solvent, the N749-TiO<sub>2</sub> heterogeneous solar cell shows that the concentration carrier together with the strength coupling are the main factors affecting the current density, fill factor and efficiency. The current density and current increase as the concentration increases and the </p> ... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jun 10 2019
Journal Name
Chemistry &chemical Technology
Quantitative Determination of Ephedrine Hydrochloride in Pharmaceutical Injections by Highly Sensitive Turbidimetric and Reversed-Phase Combined with UFLC Methods
...Show More Authors

In this paper, turbidimetric and reversed-phase ultra-fast liquid chromatography (UFLC) methods were described for the quantitative determination of ephedrine hydrochloride in pharmaceutical injections form. The first method is based on measuring the turbidimetric values for the formed yellowish white precipitate in suspension status in order to determine the ephedrine hydrochloride concentration. The suspended substance is formed as a result of the reaction of ephedrine hydrochloride with phosphomolybdic acid which was used as a reagent. The physical and chemical characteristics of the complex were investigated. The calibration graphs of ephedrine were established by turbidity method. While the second method (UFLC) was conducted using the

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Wed Dec 11 2019
Journal Name
Aip Conference Proceedings
Quantization approach to steganography perceptual color spaces
...Show More Authors

In this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Al–bahith Al–a'alami
Narrative and Electronic news Story: (Semiotic approach)
...Show More Authors

The e-news is one of the most important journalistic arts in new media (the Internet). The process of telling the story by the journalist is an important aspect of the communicative process between the users of the internet and the reporter. The electronic news is characterized by having text, fixed images, animations, videos and sound. All these give greater vitality to the communicative process and increase the semiotic dimensions. Also, it makes the narrative process more distinctive and embodied of the elements of the event. This research studies all these aspects and tries to show the distinction between the semiotics of narration and the electronic news.

View Publication
Publication Date
Wed Jul 23 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Sat Dec 31 2016
Journal Name
Al-kindy College Medical Journal
Selective Approach in Managing Penetrating Neck Injury
...Show More Authors

Background: Penetrating Neck Injuries (PNI) management represents a challenge to most surgeons in civilian trauma, in weighing selective versus mandatory exploration of all cases in different circumstances. Data are encouraging surgeons to adopt the former approach.Objectives: The study aims to assess the selective approach in our war and terror time events in Al-Yarmouk teaching hospital.Type of the study:A retrospective study. Methods: Data of patients presented to the Thoracic and Vascular ward in Al-Yarmouk teaching hospital with PNI were assessed retrospectively, from March 2013 to March 2015, and analyzed for epidemiology, mechanism of trauma, management methods, associated organ injuries, complications and mortality. Results: Amon

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 15 2021
Journal Name
Arab World English Journal
Aggressive Language in Literature: A Pragmatic Approach
...Show More Authors

Aggression is a negative form of an anti-social behavior. It is produced because of a particular reason, desire, want, need, or due to the psychological state of the aggressor. It injures others physically or psychologically. Aggressive behaviors in human interactions cause discomfort and disharmony among interlocutors. The paper aims to identify how aggressive language manifests itself in the data under scrutiny in terms of the pragmatic paradigm. Two British literary works are the data; namely, Look Back in Anger by John Osborne (1956), and The Birthday Party by Harold Pinter (1957). This paper endeavors to answer the question of how aggressive language is represented in literature pragmatically? It is hoped to be significant to

... Show More
View Publication Preview PDF
Crossref (1)
Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Science And Research (ijsr)
Height-to-Length Ratio Effect on the Response of Unreinforced Masonry Wall Subjected to Vertical Load Using Detailed-Micro Modeling Approach
...Show More Authors

This paper aimed to investigate the effect of the height-to-length ratio of unreinforced masonry (URM) walls when loaded by a vertical load. The finite element (FE) method was implemented for modeling and analysis of URM wall. In this paper, ABAQUS, FE software with implicit solver was used to model and analysis URM walls subjected to a vertical load. In order to ensure the validity of Detailed Micro Model (DMM) in predicting the behavior of URM walls under vertical load, the results of the proposed model are compared with experimental results. Load-displacement relationship of the proposed numerical model is found of a good agreement with that of the published experimental results. Evidence shows that load-displacement curve obtained fro

... Show More
Publication Date
Tue May 05 2015
Journal Name
International Journal Of Research In Pharmacy And Chemistry
NEW APPROACH FOR DETERMINATION OF MEBEVERINE BY QUENCHED FLUORESCENCE OF ANALYTICALLY INTERESTED SPECIES USING CONTINUOUS FLOW INJECTION LASER DIODE FLUORIMETER ANALYSER
...Show More Authors

The proposed method is sensitive, simple , fast for the determination of mebeverine hydrochloride in pure form or in pharmaceutical dosage . Using Homemade instrument fluorimeter continuous flow injection analyser with solid state laser (405 nm) as a source. Where it is based upon the fluorescence of fluorescein sodium salt and quenching effect of fluorescence by mebeverine in aqueous medium. The calibration graph was linear in the concentration range 0.05 to10 mMol.L-1 (r= 0.9629) with relative standard deviation (RSD%) for 1 mMol.L-1mebeverine solution was lower than 3% (n=6). Three pharmaceutical drugs were used as an application for the determination of mebeverine. A comparison was made between the newly developed method of analysis wit

... Show More
View Publication
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More