Preferred Language
Articles
/
bsj-2616
CMC Determination and Thermodynamic Micellisation Of NPE Surfactant In Aqueous And CH3OH – H2O Solvents
...Show More Authors

The critical micelle concentration (CMC) of nonylphenolethoxylate (NPE) surfactant has been determined by measuring the surface tension as a function of the molar concentration of the surfactant in aqueous and binary mixture of water + methanol solutions at a temperature range from 20?C to 35?C. The interfacial parameters ?max, Amin, ?cmc and ?G?ads were calculated. The results indicate that the CMC increases as the temperature increases and that the addition of methanol the CMC decreases. The thermodynamic parameters such as standard Gibbs free energy (?G?), enthalpy (?H?), and entropy (?S?) of micellization were estimated using the change of CMC with temperature. The enthalpy – entropy compensation behavior of the surfactant was evaluated and a good linearity in the compensation plot has been observed.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 29 2023
Journal Name
Journal Of The College Of Education For Women
Language Ecology or Ecolinguistics: Conceptual and Theoretical Discussions
...Show More Authors

Language ecology is the interactions between the environment and language. Such a discipline, ‘language ecology’ or ‘ecolinguistics has been founded by Einar Haugen’. Accordingly,  the study aims at qualitatively reviewing the theoretical and conceptual issues surrounding the subject of language ecology  by tracing the roots of language ecology. It further highlights the fundamental inconsistencies between how the concept of ecology is perceived in sociology and biology, and is applied to language, particularly, transposing the main central concepts of bio-ecology, such as relationship/interaction, environment, and organism to human language and theory of ecological-linguistic. The theory wavers among placing the focus

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat May 04 2024
Journal Name
Sar Journal Of Pathology And Microbiology
Association between Celiac Disease and Human Leukocyte Antigen
...Show More Authors

Coeliac disease is an immunologically mediated disease of the small intestinal mucosa, characterized by flattening of the small intestinal villi, increased numbers of intra-epithelial lymphocytes and inflammatory cell infiltrates in the lamina propria, resulting in gut damage and nonspecific malabsorption of nutrients. The disease is elicited by ingestion of gluten, a protein found in several cereals, principally wheat, but also barley and to a lesser extent, oats. Successful treatment is avoidance of dietary gluten. Long-standing evidence suggests a T-cell-mediated response to peptides derived from the gliadin fraction of wheat gluten, leading to immunologically mediated intestinal injury in genetically susceptible individuals. The

... Show More
View Publication
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The psychological and health implication on drugs’ users
...Show More Authors

The research aims to identify the meaning of drug addiction, which being one of the behavioral-deviation signs. It largely seems similar to alcohol-addiction. World health organization has defined drug addiction as a sporadic or chronic-state of intoxication emerges of recurrent-consumption of drugs that impact harmfully on individual and society. The second aim is to study the psychological and health implications on drugs’ users and thirdly to design a psychological-program for those who take drugs.     

View Publication Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
Pigmentary Disorders
Vitiligo: Skin Malignancies and Tumor Suppressive Marker P53
...Show More Authors

KE Sharquie, AA Noaimi, AR Bandar, SY Mohsin, Pigmentary Disorders, 2014 - Cited by 5

View Publication
Publication Date
Thu Oct 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
ENGLISH FOR SPECIFIC PURPOSES (ESP) AND SYLLABUS DESIGN
...Show More Authors

This research has discussed the origins of ESP, addressed key notions about ESP and examined issues in ESP syllabus design. The content of the paper was determined by a need identified based on my  experience as an ESL instructor designing and delivering the content-based language program - Language Preparation for the Cadets and Employment in the Iraqi  College of Police . These issues, where possible, have been supported by current and pertinent academic literature. It is my sincerest hope that these observations will lend insight into the challenges facing the ESL instructor acting as ESP syllabus developer.

View Publication Preview PDF
Publication Date
Fri Mar 29 2024
Journal Name
Iraqi Journal Of Science
Electron Scattering from Stable and Exotic Li Isotopes
...Show More Authors

     The nuclear shell model was used to investigate the bulk properties of lithium isotopes (6,7,8,9,11Li), i.e., the ground state density distributions and C0 and C2 components of charge form factors. The theoretical treatment was based on supposing that the Harmonic-oscillator (HO) potential governs the core nucleons while the valence nucleon(s) move through Hulthen potential. Such assumptions were applied for both stable and exotic lithium isotopes. The HO size parameters (  and ), the core radii ( ) and the attenuation parameters (  and ) were fixed to recreate the available empirical size radii for lithium isotopes under study.

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
International and Regional Competition for the African Coast
...Show More Authors

This study aimed at analyzing and studying the strategic and geopolitical importance of the Sahel region, which increased the regional competition for the resources of the region, especially the energy resources that have been and continue to be one of the axes of conflict and competition between these forces.
The researcher tried to review the competition between the international force, France, the United States of America, China, Algeria and Libya, and the African coast. We note that there is a positive correlation between the severity of the conflict and the intensity of the competition of the major powers to control the countries of the region and the extent of political and economic stability These countries are directly affecte

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
European Journal Of Pure And Applied Mathematics
e*-Essential small submodules and e*-hollow module
...Show More Authors

Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref