Preferred Language
Articles
/
jcoeduw-1574
The Complex Relationship Between Darwinism, Geopolitics and Geographic Colonization Research the Relationship Between Geopolitics and Ethnography
...Show More Authors

Research on geopolitical and geopolitical studies relates to a range of sciences that can be called auxiliary sciences, such as political science, international relations in particular, and history, but their focus is rarely on science and ethnography

That the issues and problems of the world today has become so large and complex that does not allow a specific field or knowledge to solve one of the need for the newly known knowledge integration (geopolitics and geopolitics) in particular to move towards cognitive integration to understand many of the problems and global issues that faced The importance of this study comes to clarify the relationship between Darwinism, geopolitics and geopolitics. The geopolitics in modern terms did not come from a vacuum, especially the idea of ​​the "vital field" Which had been affected by social Darwinism and had had an impact on the geographical expansion of colonialism and the resulting calamities and wars. The research attempts to reveal the view of Western civilization of these concepts and theories and explain the position of Islam and try to compare the two sides.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Science
Evaluation of Chitosan-Alginate Nanoparticle as A Stable Antibacterial Formula in Biological Fluids
...Show More Authors

      This research mainly focuses on the preparation of chitosan-alginate Nanoparticle by ionotropic gelation method using calcium chloride and sodium alginate to form nanocomposites of CH-ALg, examine their antibacterial activity against multidrug resistance (MDR) bacteria, and evaluate the stability of chitosan-alginate formula in different biological fluids, including simulated gastric fluid (SGF) and intestinal fluid (SIF). The average diameter of particles size prepared was measured by an Atomic force microscope (AFM) and it was 61.91 nm. Otherwise, the nature of functional groups present in CH-ALg nanoparticle was investigated by Fourier transforms infrared (FTIR) analysis. The stability of synthesized CH-ALg nanoparticle was

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Mon May 01 2023
Journal Name
Journal Of Engineering
Producing Sustainable Roller Compacted Concrete by Using Fine Recycled Concrete Aggregate
...Show More Authors

One-third of the total waste generated in the world is construction and demolition waste. Reducing the life cycle of building materials includes increasing their recycling and reuse by using recycled aggregates. By preventing, the need to open new aggregate quarries and reducing the amount of construction waste dumped into landfills, the use of recycled concrete aggregate in drum compacted concrete protects the environment. Four samples of PRCC were prepared for testing (compressive strength, tensile strength, flexural strength, density, water absorption, porosity) as the reference mix and (10, 15, and 20%) of fine recycled concrete aggregate as a partial replacement for fine natural aggregate by volume. The mix is designed according to

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Mar 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Semi-Essential Submodules
...Show More Authors

Let R be a commutative ring with identity and let M be a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of semi-essential submodules which introduced by Ali S. Mijbass and Nada K. Abdullah, and we make simple changes to the definition relate with the zero submodule, so we say that a submodule N of an R-module M is called semi-essential, if whenever N ∩ P = (0), then P = (0) for each prime submodule P of M. Various properties of semi-essential submodules are considered.

View Publication Preview PDF
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Serum antioxidant status in Iraqi women with endometrial cancer
...Show More Authors

Background: Endometrial cancer is the most common gynecologic malignancy in the United States and the fourth most common cancer in women, comprising 6% of female cancers.
Objectives: The aim of this study is to investigate the antioxidant vitamins, Coenzyme Q10 and oxidative stress in patients with endometrial cancer.
Patients and methods: Fifty six endometrial cancer women patients with various clinical stages (stage 1A, stage1B, stage II, stage III, stage IV) mean aged 58.055 ± 10.561 years, and 30 healthy women volunteers mean aged 39.731 ± 13.504 years, were includes as control group.
Results: The results in this study revealed a highly significant decreased (P<0.01) in β- carotene, Vitamin E and significant increased

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Permeability Determination of Tertiary Reservoir/Ajeel Oil Field
...Show More Authors

This paper discusses the method for determining the permeability values of Tertiary Reservoir in Ajeel field (Jeribe, dhiban, Euphrates) units and this study is very important to determine the permeability values that it is needed to detect the economic value of oil in Tertiary Formation. This study based on core data from nine wells and log data from twelve wells. The wells are AJ-1, AJ-4, AJ-6, AJ-7, AJ-10, AJ-12, AJ-13, AJ-14, AJ-15, AJ-22, AJ-25, and AJ-54, but we have chosen three wells (AJ4, AJ6, and AJ10) to study in this paper. Three methods are used for this work and this study indicates that one of the best way of obtaining permeability is the Neural network method because the values of permeability obtained be

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 27 2019
Journal Name
Iraqi Journal Of Science
ON RICKART MODULES
...Show More Authors

Gangyong Lee, S.Tariq Rizvi, and Cosmin S.Roman studied Rickart modules.

The main purpose of this paper is to develop the properties of Rickart modules .

We prove that each injective and prime module is a Rickart module. And we give characterizations of some kind of rings in term of Rickart modules.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Aug 28 2020
Journal Name
Iraqi Journal Of Science
De-Noising of Corrupted Fluoroscopy Images Based on a New Multi-Line Algorithm
...Show More Authors

 Fluoroscopic images are a field of medical images that depends on the quality of image for correct diagnosis; the main trouble is the de-nosing and how to keep the poise between degradation of noisy image, from one side, and edge and fine details preservation, from the other side, especially when fluoroscopic images contain black and white type noise with high density. The previous filters could usually handle low/medium black and white type noise densities, that expense edge, =fine details preservation and fail with high density of noise that corrupts the images. Therefore, this paper proposed a new Multi-Line algorithm that deals with high-corrupted image with high density of black and white type noise. The experiments achieved i

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Small Binary Codebook Design for Image Compression Depending on Rotating Blocks
...Show More Authors

     The searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time.   Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle  to involve four types of binary code books (i.e. Pour when , Flat when  , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding pro

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Jan 21 2021
Journal Name
Recent Innovations In Chemical Engineering (formerly Recent Patents On Chemical Engineering)
Soap Production Using Vacuum Reactive Distillation: Batch Model
...Show More Authors

Introduction: Although soap industry is known from hundreds of years, the development accompanied with this industry was little. The development implied the mechanical equipment and the additive materials necessary to produce soap with the best specifications of shape, physical and chemical properties. Objectives: This research studies the use of vacuum reactive distillation VRD technique for soap production. Methods: Olein and Palmitin in the ratio of 3 to 1 were mixed in a flask with NaOH solution in stoichiometric amount under different vacuum pressures from -0.35 to -0.5 bar. Total conversion was reached by using the VRD technique. The soap produced by the VRD method was compared with soap prepared by the reaction - only method which

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption
...Show More Authors

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF