Preferred Language
Articles
/
cxjGDJYBVTCNdQwCKYFA
Human biometric identification: Application and evaluation
...Show More Authors

Crossref
View Publication
Publication Date
Mon Dec 28 2020
Journal Name
The Iraqi Journal Of Veterinary Medicine
Isolation and Molecular Identification of Nontuberculous Mycobacterium from Different Species of Fish in Karbala Province, Iraq
...Show More Authors

This study was designed for isolation and molecular identification of Nontuberculous Mycobacterium (NTM) from fish during the period between October and December 2017 from Karbla province, Iraq. This study included 200 fresh fish samples from four different species including Spondyliosoma cantharus, Liza abu, Carassius carassius and Cyprinuscarpio. Three samples of each fish were taken including gills, muscles and all internal organs. The samples were processed by decontamination, concentration of 4% sodium hydroxide, and 0.1 ml of sediment was streaking on Löwenstein Johnson (LJ) media; then the bacterial cultures were incubated at 28-30 °C for 3days up to 4 weeks and suspected colonies were stained with acid fast stain to confir

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iscience
Identification and Characterization of Highly Fluorescent Pigment Cells in Embryos of the Arabian Killifish (Aphanius Dispar)
...Show More Authors

View Publication
Scopus (6)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Journal Of New Theory
Brief review of soft sets and its application in coding theory
...Show More Authors

In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.

Publication Date
Wed Jun 27 2018
Journal Name
Journal Of The College Of Education For Women
Kinds of unknowns and government linkages -empirical study of the application
...Show More Authors

It is no secret that the prophets speech is of great importance, as the second source of Islamic legislation after the Holy Quran, and as such we must reserve and verify the authenticity of the novel and the narrators seizure, and all the conditions laid down by the scholars.

The subject of our research here concerns part of this verification, which is the unknown, the subject of the unknown hadith is considered a matter of great interest by the modernists because it relates to the validity of the novel and the narrators, and the methods of the modernists varied in terms of the reasons for this weakness, the fool never entertained them by the reckless narrative.

I chose the subject of my research the types of Mahjail and

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
Moderation between the anvil of application and the hammer of extremism
...Show More Authors

This research study focuses on fundamental questions. It deals with the content of the critical reviews through which the most important sources that undermine the renaissance of the Islamic human society can be concluded. It is the vague fetishization of the sacred between religion, politics, and ideas, which members of society live in  and which raised the dust of closed-minded fanaticism that led to the return of deviant extremism. It is oppression, violence, and domination, all of which are professional tools in the manufacture of the ideology of extremism in all its forms. Here,  the idea matured in giving a human, intellectual and philosophical overview that mixed the required drawing in the formulation of scientific cont

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Mefenamic Acid Selective Membranes Sensor and Its Application to pharmaceutical Analysis
...Show More Authors

PVC membrane sensor for the selective determination of Mefenamic acid (MFA) was constructed. The sensor is based on ion association of MFA with Dodecaphospho molybdic acid (PMA) and Dodeca–Tungstophosphoric acid(PTA) as ion pairs. Nitro benzene (NB) and di-butyl phthalate (DBPH) were used as plasticizing agents in PVC matrix membranes. The specification of sensor based on PMA showed a linear response of a concentration range 1.0 × 10–2 –1.0 × 10–5 M, Nernstian slopes of 17.1-18.86 mV/ decade, detection limit of 7 × 10-5 -9.5 × 10 -7M, pH range 3 – 8 , with correlation coefficients lying between 0.9992 and 0.9976, respectively. By using the ionphore based on PTA gives a concentration range of 1.0 × 10–4 –1.0 × 10–5 M,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Application of levofloxacin and doxycycline in treatment of vaginal chlamydial infection
...Show More Authors

Doxycycline and levofloxacin are heterocyclic organic compounds that are now popularly used to treat some bacterial infections. In this study which was conducted on patients from a private clinic, we compared the use of two commonly used antibiotics for the treatment of diagnosed cases with vaginal chlamydial infection: levofloxacin and doxycycline. Vaginal chlamydial infection is considered to be a very common sexually transmitted infection. It may have minimal symptoms which can lead to neglect by the patient until it leads to some important complications among which is the inability to become pregnant. This indicates early diagnosis and treatment of this infection. By comparing the results of treatment we concluded that there is no much

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Construction of Phenytoin Selective Electrodes and Its Application to Pharmaceutical Preparation
...Show More Authors

Phenytoin selective electrodes were constructed based on penytoin-phosphotungstate (Ph-PT) complex with different plasticizers; di-butyl phosphate (DBP), tri-butyl phosphate (TBP), di-butyl phthalate (DBPH),and o-nitro phenyl octyl ether (NPOE) phthalate. The electrodes based on DBPH, ONPOE plasticizers gave Narnistain slope which are, 56.4 and 55.3mV/decade with detection limit of 1.9x10-5 M , 1.8x10-5 and concentration range 10-1 to 10-4 M and pH range 3.0 – 8.0. The electrodes based on TBP and DBP showed non-Nernistain slopes, 40.2,40.5 mV/decade for both plasticizers. Interfering of some cations was investigated and shows no interfering with electrodes response. Potentiometric methods were used for measuring phenytion in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Systematic Reviews In Pharmacy
Recent Development In Oxine Complexes And Their Medical Application: A Review.
...Show More Authors

This review is concluded of 8-Hydroxyquinline (8HQ) compound and derivatives which has a very significant interests with a strong fluorescence , furthermore the relationship between divalent metal ions and characteristic of chelating . In the same way coordinated features have increase of its organic action and inorganic behavior by giving many samples of compounds which are a good chelating agents ligands with more capable of forming very stable complexes.Therefore, the role of (8HQ) is not limited on complexes only but its applications in different fields so this review will focus on demonstration preparation methods and properties of (8HQ) derivatives with their complexes and applications, hopefully that we will cover a part of scientifi

... Show More
View Publication
Publication Date
Sun Jun 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design and Implement an EC-Application Based on Multi Database Environment
...Show More Authors

 The vast majority of EC applications are the web-based deployed in 3-tire Server-Client environment, the data within such application often resides within several heterogeneous data sources. Building a single application that can access each data sources can be a matter of challenging; this paper concerns with developing a software program that runs transparently against heterogeneous environment for an EC-application.
 

View Publication Preview PDF