Preferred Language
Articles
/
bsj-4340
Mixed Micelles of Binary Mixtures of Sodium Dodecylbenzene Sulfate and Tween 80 Surfactants in Aqueous Solutions
...Show More Authors

In the present work, the surface properties of mixed binary surfactants containing sodium dodecylbenzene sulfate (SDBS) and Tween 80 (TW80) surfactants in aqueous solutions were studied at temperature 293 K using surface tension measurements. The critical micelle concentration (cmc) magnitude for both individual surfactants and their mixtures were established the obtained results revealed  that the magnitude of cmc of the mixtures are less than the magnitude of individual surfactants and decrease with the increase in Tween 80 percent in solution which indicate the nonideal  mixing of the two surfactants. The values of molecular interaction parameters  and the mole fraction of surfactants in the micelle (X1) were calculated on the basis of Rubingh’s model and showed that the interaction parameter is always negative but at 0.9 mole fraction of TW80 surfactant (α1) is positive

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of The College Of Languages (jcl)
Las preposiciones en español: Estudio analítico de "Por" y "Para"
...Show More Authors

Resumen

                       Este trabajo de investigación ofrece uno de los temas relevantes en la lengua, el cual es estudiar las dimensiones sintácticas, semánticas y pragmáticas de las preposiciones, en general, y de las dos preposiciones "Para" y  "Por" en concreto, en una unidad linguística más amplia que la llamada "Oración". En la parte  referida al  estudio de las dos preposiciones mencionadas,  estudiamos sus distntos usos funcionales, usos que se acercan, unas veces,  entre sí  y  se alejan en otras. 

Abstract    

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
Iklīl For Humanities Studies
المنفى في شعر الشاعر الاسباني رافائيل البرتي و الشاعر العراقي يحيى السماوي
...Show More Authors

يعد شعر المنفى احد اهم روافد الادب المعاصر فهو يعكس الإبداع الشعري الحقيقي للشاعر المنفي، ويعكس في الوقت ذاته الحنين والألم الذي يعاني منه بسبب البعد عن وطنه. ومن ناحية أخرى، يصور شعر المنفى حالة المقاومة والنضال التي يختزنها الشاعر . نتناول في هذا البحث م وضوع شعر المنفى عند شاعرين منفيين لم يلتقيا في بلد واحد ولم يتبنيا ثقافة فكرية مشتركة, إلا أن الشاعرين تحملا نفس مرارة المنفى التي عبرا عنها بشكل واضح في شعر

... Show More
Publication Date
Wed Dec 29 2021
Journal Name
Journal Of The College Of Education For Women
The Skills of Intended Meaning behind the Context when Reading Poetry among Fifth Grade Students- Literary Branch from Teachers’ Perspectives
...Show More Authors

        The current research aims to investigate the skills of the intended meaning beyond the context when reading poetry among fifth literary students. To achieve the aim of the research, the researcher has followed the descriptive approach and used two tools: an open questionnaire that includes an inquiry about the skills of the intended meaning beyond the poetic context, and a closed questionnaire that were examined by the juries, and modified accordingly. Besides, its validity and stability were examined by applying the study on an exploratory sample of (15) teachers to reach its final version and determine the time required to answer it. Then, the researcher applied it on the research sample of (9

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Phenomena of corruption and money laundering: and causes and risks and their role in the financing of terrorism in Iraq and finding ways of treatment
...Show More Authors

Iraq  is Suffering nowadays from the criminal triad represented by the fiscal and administrative corruption, money laundering and terrorism, which are intertwined in a very related relations, as each of them support the other . Since the over growth has been one of its characteristics leaving behind a very dangerous negative effects whether it was social , economic or even political impacts . As a result , this trial is now represents a high risk that threatens the present and the future of Iraq . On the political , economic and social level , it is well to mention that the poor direct investment , the increasing rates of poverty , unemployment , inflation as well as the smuggling of goreign currency an

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 14 2022
Journal Name
Journal Of The College Of Languages (jcl)
Images of ruin in "Throne" and " Water stream" by Maysaloon Hadi and "War" by Glezio: A Compartive Study: Les images du débris dans "Le trône et le ruisseau " de Maysaloon Hadi et "La guerre" de Le Glézio (étude comparative)
...Show More Authors

Our research comes to shed light on Iraqi literature as literature that arose in special circumstances alongside foreign literature. Using comparative research methods, we chose to highlight two distinguished writers, who have their mark in the world of literature. The first is the Iraqi writer Maysaloun Hadi, who is considered an icon of Iraqi feminist literature, and the second is the French writer Le Clézieu, who won the Nobel in 2008. We will see through the research how the two authors expressed their views of modernity and urbanism. And how each of them separately portrayed the psychological and moral projections that formed the essence of man today. 

Résumé

Notre recherche abord un des points inc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)
...Show More Authors

            The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.

The present paper puts forward an enhancement for the throughput performance metric by p

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 08 2018
Journal Name
Arab Science Heritage Journal
علاج أمراض الجهاز التناسلي الذكري من كتاب كامل الصناعة الطبية الضرورية(المعروف بالملكي)
...Show More Authors

Since God created human and had him live on Earth, he was certain and focused on marriage and having lineage for the purpose of development of this Earth which he – God - provided for humans.

We notice that he – human - was interested in curing  disease of the genital system, (whether male and female) and he used different methods for that and what is available in every era and periods, we saw him exceeded in using different medical Herbs in different area of Earth and used it efficiently for healing and getting the best results they even inherited from one generation  to another, and they didn't even stop here,

View Publication Preview PDF
Publication Date
Wed Apr 01 2009
Journal Name
Journal Of Educational And Psychological Researches
الاسباب النفسية والاجتماعية لفرط النشاط الحركي لطلبة المرحلة الابتدائية من وجهة نظر المعلمين
...Show More Authors

هدفت الدراسة الى معرفة:

 

  1. الاسباب النفسية والاجتماعية لفرط النشاط الحركي لدى تلاميذ المرحلة الابتدائية.
  2. الاسباب الاكثر حدة وتكراراً من وجهة نظر افراد العينة. اقتصر البحث على معلمي ومعلمات المرحلة الابتدائية لمحافظة بغداد للعام الدراسي 2004/2005.

تم بناء استبيانين

  أ- استبيان خاص بالاسباب النفسية.

  ب- استبيان

... Show More
View Publication Preview PDF