Preferred Language
Articles
/
ijp-44
Experimental study of nonlinear characterization of hybrid SWCNTs/Ag-NPs fluids, using nonlinear diffraction technique
...Show More Authors

Based on nonlinear self- diffraction technique, the nonlinear optical properties of thin slice of matter can be obtained. Here, nonlinear characterization of nano-fluids consist of hybrid Single Wall Carbon Nanotubes and Silver Nanoparticles (SWCNTs/Ag-NPs) dispersed in acetone at volume fraction of 6x10-6, 9x10-6, 18x10-6 have been investigated experimentally. Therefore, CW DPSS laser at 473 nm focused into a quartz cuvette contains the previous nano-fluid was utilized. The number of diffraction ring patterns (N) has been counted using Charge - Coupled- Device (CCD) camera and Pc with a certain software, in order to find the maximum change of refractive index ( of fluids. Our result show that the fraction volume of 18x10-6 is more nonlinearity than others.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 24 2021
Journal Name
Iraqi Journal Of Science
Molecular Detection of Suspected Leishmania Isolates Using Polymerase Chain Reaction
...Show More Authors

Leishmaniasis is a widespread parasitic disease that occurs as a result of infection with a unicellular parasite belonging to the genus Leishmania. Diagnosis by conventional methods is inaccurate and is not sensitive to confirm the genus infection. Here, we have investigated a methods for Leishmania genus diagnosis, which includes the technique of polymerase chain reaction to detect the presence of the parasite at in vitro for promastigote cultures using three genus-specific primer pairs to amplify HSP70, ITS, and ITS2. The results showed single band of ~1422, ~1020, and ~550 respectively. This study has proved the ability of these primer pairs to detect Leishmania infection and recommend them to be used for detection of leishmaniasis in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 06 2014
Journal Name
Journal Of Educational And Psychological Researches
"The Effect of Using Short stories in Enriching Students Vocabulary"
...Show More Authors

               The present study aims at answering the following questions:.

1-Which is more effective in enriching students.  Vocabulary ,the use of short stories or the      traditional way?

2-What extent has the use of short stories an effect upon the students. achievement in           vocabulary test?

3- Is there any significant difference between the male and female student of the                    experimental group in vocabulary achievement test?

 &nbsp

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Craniofacial Surgery
Radiographic Assessment of Nasopalatine Canal Using Cone Beam Computed Tomography
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
DIFFICULTIES IN USING THE INTERNET IN THE TEACHING OF SCIENCES
...Show More Authors

The present research aims at recognizing the difficulties and problems which hamper teachers and educators alike when using the internet for educational purposes.It discusses the benefits of the internet as a source of information or publication and as a communicative tool.Arandom sample of (30) teachers working at schools in Baghdad / Second Risafa,was selected.Three of the sample members use the internet for student project plans via internet centers, whereas 16 of them use it for chatting, emailing and research purposes.The rest of the sample have limited knowledge of the internet. The researcher used the interviewing method to gather data from

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Iraqi Journal Of Science
Hiding and Encryption of Secret Image Using Secret Sharing Scheme
...Show More Authors

With the development of information technology and means for information transfer it has become necessary to protect sensitive information. The current research presents a method to protect secret colored images which includes three phases: The first phase calculates hash value using one of hash functions to ensure that no tampering with or updating the contents of the secret image. The second phase is encrypting image and embedding it randomly into appropriate cover image using Random Least Significant Bit (RLSB) technique. Random hiding provides protection of information embedded inside cover image for inability to predict the hiding positions, as well as the difficult of determining the concealment positions through the analysis of im

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 16 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Determination of Ibuprofen in Pharmaceutical Formulations Using Differential Pulse Polarography
...Show More Authors

     A reliable differential pulse polarographic (DPP) method has been developed and applied for the determination of ibuprofen IBU in dosage form with dropping mercury electrode (DME) versus Ag/AgCl. The best peak was found at cathodic peak of -1.18 V in phosphate buffer at pH=4 and 0.025M of KNO3 as supporting electrolyte. In order to obtaine the highest sensitivity, instrumental and experimental parameters were examined including the type and concentration of supporting electrolyte, pH of buffer solution, pulse amplitude and voltage step time. Diffusion current showed a direct linear relationship to ibuprofen concentration in the range of (5 – 30) μg. mL-1 (2.43× 10-5

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Modeling and Control of Fuel Cell Using Artificial Neural Networks
...Show More Authors

This paper includes an experimental study of hydrogen mass flow rate and inlet hydrogen pressure effect on the fuel cell performance. Depending on the experimental results, a model of fuel cell based on artificial neural networks is proposed. A back propagation learning rule with the log-sigmoid activation function is adopted to construct neural networks model. Experimental data resulting from 36 fuel cell tests are used as a learning data. The hydrogen mass flow rate, applied load and inlet hydrogen pressure are inputs to fuel cell model, while the current and voltage are outputs. Proposed model could successfully predict the fuel cell performance in good agreement with actual data. This work is extended to developed fuel cell feedback

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Simultaneous Determination of Sulfanilamide and Furosemide by Using Derivative Spectrophotometry
...Show More Authors

A simple, precise and accurate spectrophotometric method has been developed for simultaneous estimation of sulfanilamide and furosemide in their mixture by using first and second order derivative method in the ultraviolet region. The method depends on first and second derivative spectrophotometry, with zero-crossing and peak to base line and peak area measurements. The first derivative amplitudes at 214, 238 and 266 nm were selected for the assay of sulfanilamide and 240, 260, 284, 314 and 352 nm for furosemide. Peak area at 201222, 222-251 and 251-281 nm selected for estimation of sulfanilamide and at 229-249, 249270, 270-294, 294-333 and 333-382 nm for furosemide. The second derivative amplitudes at 220, 252 and 274 nm for sulfanilamid

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Saponification of Diethyl Adipate with Sodium Hydroxide Using Reactive Distillation
...Show More Authors

This research presents a new study in reactive distillation by adopting a consecutive reaction . The adopted consecutive reaction was the saponification reaction of diethyl adipate with NaOH solution. The saponification reaction occurs in two steps. The distillation process had the role of withdrawing the intermediate product i.e. monoethyl adipate from the reacting mixture before the second conversion to disodium adipate occurred. It was found that monoethyl adipate appeared successfully in the distillate liquid. The percentage conversion from di-ester to monoester was greatly enhanced (reaching 86%) relative to only 15.3% for the case of reaction without distillation .This means 5 times enhancement . The presence of two layers in both

... Show More
View Publication Preview PDF
Crossref (1)
Crossref