Preferred Language
Articles
/
jcofarts-667
The industrial design aesthetic and its relationship with the recipient: باسم قاسم الغبان، صلاح نوري الجيلاوي
...Show More Authors

The research problem lies in determining the beauty ranges between the receiver and the industrial product, The goal of the research, it is the definition of aesthetics in industrial design and its relation to the receiver, and the researcher outcome several conclusions of the, the most important was: 1. The role of accumulated experience, and their interaction with the vision of the artwork in achieving aesthetic perception and levels of artistic and aesthetic values and by the level of growth this taste of the recipient. 2. There are interactive and close relationship be the primary means for the integration of functional and aesthetic meaning the designer meant to get it to the receiver.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 09 2021
Journal Name
Medico Legal Update
Knowledge and Attitudes of Vaccination among Iraqi Pharmacy Students
...Show More Authors

Objective: Since the vaccination rate is largely affected by low knowledge and negative attitudes ofhealthcare professionals, so this study aimed to weigh up the vaccination knowledge and attitudes ofpharmacy students.Method: A pilot study using a survey to investigate demographic data, knowledge (20 questions), andattitudes (5 questions) of 156 fifth year and 121 third year pharmacy students from College of Pharmacy/University of Baghdad.Results: The mean score of knowledge and attitudes was intermediate (16.654 and 14.917 out of 25 for thefifth and the third grades, respectively) with a significant difference between the two groups, the studentsshown to have favorable attitudes about vaccination. The score of the students is not i

... Show More
View Publication
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Partial Purification and Characterization of Catalase from Banana Peels
...Show More Authors

Catalase (EC 1.11.1.6) is a well known enzyme which exists in almost all living creatures exposing to oxygen (such as plants, bacteria, and animals). It is a very necessary enzyme to protect the cell from oxidative detriment by reactive oxygen species (ROS). The aim of this study is the partial purification and characterization of Catalase enzyme from Banana peels. In this study, fresh banana peels are treated with 70 % ethanol ,further separated with chloroform ,water and ethyl acetate respectively .The supernatant of the enzymatic sample which is treated with chloroform is loaded into gel filtration column with Sephadex G-100 (1.0 x 90 cm) equilibrated with pH7 buffer media (phosphate buffer 0.1 M). Kinetic studies of the purified en

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Synthesis and Characterization of New 2-Quinolone Sulfonamide Derivatives
...Show More Authors

A series of new 2-quinolone derivatives linked to benzene sulphonyl moieties were performed by many steps: the first step involved preparation of different coumarins (A1,A2) by condensation of different substituted phenols with ethyl acetoacetate. The compound A1 was treated with nitric acid to afford two isomers of nitrocoumarin derivatives (A3) and (A4). The prepared compounds (A2, A3) were treated with hydrazine hydrate to synthesize different 2-quinolone compounds (A5,A6) while the coumarin treated with different amines gave compounds (A7,A8). Then the synthesized 2-quinolone compounds (A5-A8) treated with benzene sulphonyl chloride to afford new sulfonamide derivatives (A9-A12). The synthesized compounds were characterized by FT-IR, 1H

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 10 2019
Journal Name
Applied Physics A
Characterization and nanocrystalline growth of a-Ge:In/c-GaAs
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Fracture Toughness and Hardness studying for Polymer-Ceramic Composite
...Show More Authors

A particulate composite material was prepared by adding the Titanium dioxide (TiO2) with a particle size of (75-150) µm to Epoxy resin at weight percentage of (10%,20%,30%,40%,50%).The following some mechanical properties were studied,fracture toughness, hardness.casting preparation methods were used in this study includes preparing plate of matrix and composites. specimens were prepared according to ASTM for the Mechanical properties tests. After that Another samples were heat treated for three and six hour at 65C?. Fracture toughness (Kic) represent for stress intensity factor results were showed that the curve of three hours aging increases in fracture toughness (Kic) for composites but for six hours aging increases fracture tough

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Chemtech Research
Biological Assessment, Heamatological Study, and Environmental Detection of Eugenol
...Show More Authors

Eugenol is found in essential oils of many plants. It belongs to a class of naturally occurring phenolic monoterpenoids, chemically it is an allyl chain-substituted guaiacol. A study was conducted on the compound of Eugenol, which included different studies. The first study was the determination of eugenol in body fluid, which includes serum, saliva and urine has been found the highest concentration was in urine then serum and saliva. The second study was the hematological study. Complete blood count was accomplished on the volunteers alredy administrated with eugenol contained mouthwash the analysis was accomplished before and after the mouth wash use. The result observed a slightly negative results and was not that significant, wh

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Nov 19 2024
Journal Name
Aip Conference Proceedings
CT scan and deep learning for COVID-19 detection
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Image Watermarking based on Huffman Coding and Laplace Sharpening
...Show More Authors

In this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 30 2024
Journal Name
Wasit Journal For Pure Sciences
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of

... Show More
View Publication Preview PDF
Crossref