Preferred Language
Articles
/
bsj-813
The Effect of Eruca sativa extract on Gram Posative and Negative Bacteria
...Show More Authors

The antibacterial effect of (Eruca sativa) extract was evaluated by an in vitro study testing the growth of various Gram-Positive and Gram-Negative bacteria . The bactericidal activity of this extract was analyzed by serial dilution in tubes. This study,found that Gram-Negative and Gram-Positive bacteria susceptible to very low eruca concentrations. On the other hand, Gram-positive bacteria were more susceptible than Gram-negative bacteria, the minimal bactericidal concentration of Gram-positive bacteria was 5 mg ml-1 but minimal bactericidal concentration of Gram-negative bacteria was 10 mg ml-1 that mean duble inhibation concentration of Gram-positive bacteria . this study suggest that Eruca sativa leaves have inhibation effect on Gram-Posative and Gram-Negative bacteria and Eruca sativa was natural material with little side effect.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Journal Of Intelligent & Fuzzy Systems
A note on “separation axioms in fuzzy bitopological spaces”
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Assets Valuation Approaches & its Reflects on Financial Reporting Quality
...Show More Authors

Abstract

   The model of financial reporting in  Iraq  Based on a specific set of accounting objectives & concepts, which require the application of the historical cost valuation approach due to the nature of the objectives of financial reporting in Iraq, established under the unified accounting system , which focuses on serving the needs of the state because it the most influential user in setting accounting objectives and concepts, which stems mainly from the nature of the economic system in Iraq, which focuses on the public sector versus the private sector as well as the nature of the ownership business that focuses on partnership versus corpor

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jul 30 2024
Journal Name
Iraqi Journal Of Science
A Survey on Image Caption Generation in Various Languages
...Show More Authors

      The image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 31 2023
Journal Name
International Journal On Technical And Physical Problems Of Engineering
A Multiple System Biometric System Based on ECG Data
...Show More Authors

A Multiple System Biometric System Based on ECG Data

Scopus
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Recent Trends In Engineering & Research
Password Authentication Based On Modify Bidirectional Associative Memory (MBAM)
...Show More Authors

Password authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.

Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
Generalized Γ-n-Derivations on Prime Γ-Near-Rings
...Show More Authors
Abstract<p>The main purpose of this paper is to define generalized Γ-n-derivation, study and investigate some results of generalized Γ-n-derivation on prime Γ-near-ring G and <italic>K</italic> be a nonzero semi-group ideal of <italic>G</italic> which force G to be a commutative ring.</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jun 12 2006
Journal Name
Iraqi Journal Of Laser
Laser-Induced Low-Resistance Ohmic Contacts on n-Si
...Show More Authors

In the present work, the feasibility of formation near-ideal ohmic behavior of In/n-Si contact efficiently by 300 s duration Nd:YAG pulsed laser processing has been recognized. Several laser pulses energy densities have been used, and the optimal energy density that gives best results is obtained. Topography of the irradiated region was extensively discussed and supported with micrographic illustrations to determine the surface condition that can play the important role in the ohmic contact quality. I-V characteristics in the forward and reverse bias and barrier height measurements have been studied for different irradiated samples to determine the laser energy density that gives best ohmic behavior. Comparing the current results with

... Show More
View Publication Preview PDF