Preferred Language
Articles
/
bsj-3602
Some Game via Ἷ-Semi-g-Separation Axioms
...Show More Authors

The research demonstrates new species of the games by applying separation axioms via  sets, where the relationships between the various species that were specified and the strategy of winning and losing to any one of the players, and their relationship with the concepts of separation axioms via  sets have been studied.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Al- Mustansiriyah J. Sci.
Synthesis and Characterization of Some Mixed Ligand Complexes of Quinaldic Acid and α-Picoline with Some Metal Salts Basima
...Show More Authors

Some metal ions (Mn+2, Co+2, Ni+2, Cu+2, Zn+2, Cd+2 and Hg+2) complexes of quinaldic acid (QuinH) and α-picoline (α-Pic) have been synthesized and characterized on the basis of their , FTIR, (U.V-Vis) spectroscopy, conductivity measurements, magnetic susceptibility and atomic absorption. From the results obtained the following general formula has suggested for the prepared complexes [M(Quin)2( α-Pic)2].XH2O where M+2 = (Mn, Co, Ni, Cu, Zn, Cd and Hg), X = 2, X = zero for (Co+2 and Hg+2) complexes, (Quin-) = quinaldate ion, (α-Pic) = α-picoline. The results showed that the deprotonated ligand (QuinH) by using (KOH) coordinated to metal ions as bidentate ligand through the oxygen atom of the carboxylate group (-COO-) and the nitrogen ato

... Show More
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Effect of Some Fungal Pathogen and Some Storage Treatments on Tomato and Cucumber Fruits Under Cold Storage (8? C)
...Show More Authors

In study carried out in the cold storage in college of Agric./Univ. of Baghdad at 8 ? C. shows that Alternaria , Pencillium , Rhizoctonia , Mucor , are the fungi that causes tomato fruits decay. This is the first record of Rhizoctonia and Mucor as a Tomato fruits rot under 8º c in Iraq. There is no fungal infection on cucumber fruits under 8 ? C. . Waxing tomato fruits reduced the severity of the fungi infection and gave shelflife (19 days) under 8 ? C. There is an infection with Mucor was found in tomato fruits kept in perforated polyethylene bages with 16 bores prevent the infection and the lowest severity and frequency of infection was found in waxed tomato fruits. Part of M.Sc thesis of the Second author.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Effect of Some Medicinal Plants on the Activity of Some Immunological Factors in Saliva and Serum of Type –?? Diabetics
...Show More Authors

The study involved 45 male and 45 females of diabetic patients type- ?? aged from 40-69years , and with the same numbers of males and females for control , all the patients and controls were without any periodontal diseases and without any systemic disease. Diabetic patients were divided in to three groups according to the degree of periodontitis , and the inflamed gingiva of all groups of diabetic patients were treated with the dried fruits powder (crude) of medicinal plants Quercus robur , Thuja occidenalis , Terminalia chebula, Anethum graveolens , respectively and mixture. Some immunological and antimicrobial factors (IgA, Lactoferrin , Lysozyme ) , were detected in serum and saliva of diabetic patients and the control

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Synthesis and Characterization of Some New Mixed- Ligand Complexes Containing Schiff Base and 3-Picoline with Some Metal Salts
...Show More Authors

Some metal ions (Mn+2, Co+2, Ni+2, Cu+2,Zn+2 and Cd+2) complexes of quodridentats Schiff base derived from (2-hydroxy benzaldehyde and 4,4'-methylenedianiline as primary ligand and 3-picoline (3-pic) secondary ligand have been synthesized and characterized on the basis of their 1H ,13C-NMR, FT-IR, UV-Vis spectroscopy, conductivity measurements, elemental analysis, and magnetic moments, metal to ligands ratio in all complexes has been found to be (1:1:2) (M:Schiff base:3-pic), Schiff base behaves as neutral tetra dentate ligand with (N2,O2) system from the results obtained, the following general formula has suggested for the prepared complexes [M+2(2-mbd)(3-pic)2] and octahedral stereochemistry, Where M+2 = (Mn , Co , Ni , Cu , Zn and Cd), 2

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
A Study of a-Si:H Absorption Edge Using Dunstan’s Model
...Show More Authors

The optical absorption data of Hydrogenated Amorphous Silicon was analyzed using a Dunstan model of optical absorption in amorphous semiconductors. This model introduces disorder into the band-band absorption through a linear exponential distribution of local energy gaps, and it accounts for both the Urbach and Tauc regions of the optical absorption edge.Compared to other models of similar bases, such as the O’Leary and Guerra models, it is simpler to understand mathematically and has a physical meaning. The optical absorption data of Jackson et al and Maurer et al were successfully interpreted using Dunstan’s model. Useful physical parameters are extracted especially the band to the band energy gap , which is the energy gap in the a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
...Show More Authors

With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Simplification of new fashion design methods
...Show More Authors

Simplification of new fashion design methods

View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A Finite Element Analysis for the Damaged Rotating Composite Blade
...Show More Authors

In this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included.  The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Constructing a Software Tool for Detecting Face Mask-wearing by Machine Learning
...Show More Authors

       In the pandemic era of COVID19, software engineering and artificial intelligence tools played a major role in monitoring, managing, and predicting the spread of the virus. According to reports released by the World Health Organization, all attempts to prevent any form of infection are highly recommended among people. One side of avoiding infection is requiring people to wear face masks. The problem is that some people do not incline to wear a face mask, and guiding them manually by police is not easy especially in a large or public area to avoid this infection. The purpose of this paper is to construct a software tool called Face Mask Detection (FMD) to detect any face that does not wear a mask in a specific

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref