Preferred Language
Articles
/
bsj-2431
Synthesis of Silver Nanoparticles from Malva parviflora Extract and Effect on Ecto-5'- Nucleotidase(5'-NT), ADA and AMPDA Enzymes in Sera of Patients with Arthrosclerosis
...Show More Authors

The present research included synthesis of silver nanoparticle from(1*10-3,1*10-4 and1*10-5) M aqueous AgNO3 solution through the extract of M.parviflora reducing agent. In the process of synthesizing silver nanoparticles we detected a rapid reduction of silver ions leading to the formation of stable crystalline silver nanoparticles in the solution.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Palarch's Journal Of Archaeology Of Egypt/egyptology
EMIRATI-ISRAELI NORMALIZATION AND ITS IMPACT ON THE PALESTINIAN-ISRAELI CONFLICT
...Show More Authors

The Arab-Israeli conflict passed through several stages before reaching the final stage of normalization, namely conflict, conflict and public normalization. Thus, the UAE became the third country to establish official relations with Israel after Egypt in 1979 and Jordan in 1994. With the announcement of the normalization agreement, opinions varied between supporters and opponents of the idea of normalization with Israel, and some countries expressed their acceptance of establishing official relations between the Emirates and Israel, while others warned of the consequences of normalization, which they described as treachery. Although the UAE confirmed that the normalization agreement between the two sides was credited with stopping Israel's

... Show More
View Publication Preview PDF
Publication Date
Sun May 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Color Image Steganography Based on Discrete Wavelet and Discrete Cosine Transforms
...Show More Authors

        The secure data transmission over internet is achieved using Steganography. It is the art and science of concealing information in unremarkable cover media so as not to arouse an observer’s suspicion. In this paper the color cover image is divided into equally four parts, for each part select one channel from each part( Red, or Green, or  Blue), choosing one of these channel depending on the high color ratio in that part. The chosen part is decomposing into four parts {LL, HL, LH, HH} by using discrete wavelet transform. The hiding image is divided into four part n*n then apply DCT on each part. Finally the four DCT coefficient parts embedding in four high frequency sub-bands {HH} in

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Person-Organization's Environment Fit and it's Reflection on the Work Outcomes
...Show More Authors

This study aims to studying of Person and organization’s environment fit in a sample of Private bank’s reflection in its basic dimensions (Person-organization fit ,Person-Job fit, Person-group fit and Person- Person-fit )in the Work Outcomes (job satisfaction, the intention to leave the job, Job Engagement, and organizational  citizenship behavior ).

The questionnair’e has been used as a basic  instrument to gather data , As well as personal interviews with some of the staff of the research sample of private banks which were represented by (5) and included banks (Bank of Assyria for investment, the North Bank for Finance and Investment , Bank of the Tigris

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Entry cost based on activity-based cost specifications and comparative study
...Show More Authors

Several recent approaches focused on the developing of traditional systems to measure the costs to meet the new environmental requirements, including Attributes Based Costing (ABCII). It is method of accounting is based on measuring the costs according to the Attributes that the product is designed on this basis and according to achievement levels of all the Attribute of the product attributes. This research provides the knowledge foundations of this approach and its role in the market-oriented compared to the Activity based costing as shown in steps to be followed to apply for this Approach. The research problem in the attempt to reach the most accurate Approach in the measurement of the cost of products from th

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 01 2007
Journal Name
Al-nahrain Journal For Engineering Sciences
Monitoring and Control on Impressed Current Cathodic Protection for Oil Pipelines
...Show More Authors

This research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Some Results on the Average Inverse Shadowing Property and Strong Ergodicity
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Sun Jun 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design and Implement an EC-Application Based on Multi Database Environment
...Show More Authors

 The vast majority of EC applications are the web-based deployed in 3-tire Server-Client environment, the data within such application often resides within several heterogeneous data sources. Building a single application that can access each data sources can be a matter of challenging; this paper concerns with developing a software program that runs transparently against heterogeneous environment for an EC-application.
 

View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Stances on the damage to manuscripts and ways to address them
...Show More Authors

Humans knew writing and to blog motivated by the need for registration and documentation, and tried from the very beginning of research to find the most suitable material for this purpose, he used many different materials in form, nature, and composition, so it is written on the mud by the ancient Sumerian people in different forms and when the text is long Numbered as the pages of the book at the present time, this research will deal with the damage to manuscripts and then find ways to address them.

View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (16)
Crossref (8)
Scopus Crossref