Preferred Language
Articles
/
bsj-3946
The Effect of MHD on a Longitudinal Flow of a Fractional Maxwell Fluid between Two Coaxial Cylinders
...Show More Authors

      In this paper fractional Maxwell fluid equation has been solved. The solution is in the Mettag-Leffler form. For  the corresponding solutions for ordinary Maxwell fluid are obtained as limiting case of general solutions. Finally, the effects of different parameters on the velocity and shear stress profile are analyzed through plotting the velocity and shear stress profile.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
The effect of differentiated education strategy on the achievement of the students of the Institute of Fine Arts in the subject of aesthetics: وفاء شكر حسن
...Show More Authors

Current research targeted: Recognizing the impact of the differentiated education strategy on the achievement of the students of the Institute of Fine Arts / Diyala, for the academic year (2018-2019).
The researcher used the experimental approach designed by two groups (control - experimental) and with a post-test to achieve the goal of the research, and the research sample was chosen from students of the fourth stage for the academic year (2018-2019).
The sample was distributed randomly into two groups, the first experimental consisting of (30) students who studied using the differentiated education strategy, and the second control group consisting of (30) students who studied using the traditional method.
The researcher pre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
The Genetic Algorithm: A study survey
...Show More Authors

Genetic Algorithms (GA) is a based population approach. It belongs to a metaheuristic procedure that uses population characteristics to guide the search. It maintains and improves multiple solutions which may produce a high-quality solution to an optimization problem. This study presents a comprehensive survey of the GA. We provide and discuss genetic algorithms for new researchers. We illustrate which components build up the GAs and view the main results on complexity time.

View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Al-academy
The approach of deliberation in the ontemporary Iraqi theater text - theatricality Afwah-as a odel
...Show More Authors

The deliberative system of communicative studies is exposed to cultural openness, according to modern cultural studies, to establish a verbal language system that achieves reciprocal and cross-cultural relations. This research has examined the concept of deliberative approach in the contemporary Iraqi theater text by studying the deliberative system of text and its interrelationship with The stage of the verbal embodiment of the dramatic event, because the dramatic text achieves in its construction of racism, a deliberative approach between the verbal event and the language, and what later leads to the completion of the dramatic action. The research included four chapters. The first chapter was the systematic framework of the research, T

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Isolation and identification of Bacillus stearothermophilus and study the inhibition effect of squeezed grape waste extract on it.: Isolation and identification of Bacillus stearothermophilus and study the inhibition effect of squeezed grape waste extract on it.
...Show More Authors

The aim of this study was to know the inhibition activity of squeezed grape waste extract on Bacillus stearpthermophilus by using three different tempretures degree 40, 60 and 80c, in order to reduce the time exposure of food for preservation. This study include two branchs: First: isolation and identification of Bacillus stearothermophilus from soil, 5 sample were collected from the soil of the college agriculture/Baghdad university. Samples were cultured on nutrient agar, microscopic and culturing tests were conducted and many biochemical tests were done. The isolates were cultivated at 55 c and 65 c for differentiate it from Bacillus coagulans which is can't grow at 65 co. The c

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 18 2023
Journal Name
Journal Of Current Researches On Social Sciences
A Study on Sociocultural Features among Turkish and Iraqi Women
...Show More Authors

SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023

View Publication
Publication Date
Sat Mar 28 2020
Journal Name
Iraqi Journal Of Science
A Study on n-Derivation in Prime Near – Rings
...Show More Authors

The main purpose of this paper is to show that zero symmetric prime near-rings, satisfying certain identities on n-derivations, are commutative rings.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Nov 29 2018
Journal Name
Iraqi Journal Of Science
A new Color image Encryption based on multi Chaotic Maps
...Show More Authors

     This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of   1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.   

View Publication Preview PDF
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
A Study on Cosmetic Products Marketed in Iraq: Microbiological Aspect
...Show More Authors

Cosmetic products contain variable amounts of nutrients that support microbial growth. Most contaminants   in   cosmetic   products   include bacteria such as Staphylococcus, Pseudomonas, Klebsiella,   Achromobacter   and   Alcaligenes. Contaminated water  is  a  likely  source  of organisms found in cosmetic products. Products such as shampoo, hand and body lotion, facial cleanser,  and liquid soaps were analyzed. In this study, out of 60 cosmetic products analyzed, 26.4% were found to be contaminated.    Most of the contamination was from bacteria and no fungal contamination was detected.  The highest level o

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Journal Of Science
A study on Soft Pre-Open Sets using γ Operation
...Show More Authors

The concept of strong soft  pre-open set was initiated by Biswas and Parsanann.We utilize this notion to study several characterizations and properties of this set. We investigate the relationships between this set and other types of soft open sets. Moreover, the properties of the strong soft  pre-interior and closure are discussed. Furthermore, we define a new concept by using strong soft  pre-closed that we denote as locally strong soft  pre-closed, in which several results are obtained. We establish a new type of soft pre-open set, namely soft  pre-open. Also, we continue to study pre-  soft open set and discuss the relationships among all these sets. Some counter examples are given to show some relations

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref