Preferred Language
Articles
/
jeasiq-1447
Planning the main production tables using the correct binary programming method
...Show More Authors

This research include building mathematical models for aggregating planning and shorting planning by using integer programming technique for planning master production scheduling in order to control on the operating production for manufacturing companies to achieve their objectives of increasing the efficiency of utilizing resources and reduce storage and  improving customers service  through  deliver in the actual dates and reducing delays.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
A Direct Solution Scheme for Wide-Angle Electromagnetic Scattering Problems Using Compressive Sensing-Based Method of Moments
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Simultaneous Determination of Piroxicam and Codeine Phosphate Hemihydrate in a Pharmaceutical Dosage Form Using Validated HPLC Method
...Show More Authors

An easy, eclectic, precise high-Performance Liquid Chromatographic (HPLC) procedure was evolved and validated to estimate of Piroxicam and Codeine phosphate. Chromatographic demarcation was accomplished on a C18 column [Use BDS Hypersil C18, 5μ, 150 x 4.6 mm] using a mobile phase of methanol: phosphate buffer (60:40, v/v, pH=2.3), the flow rate was 1.1 mL/min, UV detection was at 214 nm. System Suitability tests (SSTs) are typically performed to assess the suitability and effectiveness of the entire chromatography system. The retention time for Piroxicam was found to be 3.95 minutes and 1.46 minutes for Codeine phosphate. The evolved method has been validated through precision, limit of quantitation, specificity,

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 01 2009
Journal Name
Ibn Al- Haitham J. Fo R Pure & Appl. Sci
Multiple Mixing Ratios of Gamma Rays Erγ)nEr(n, From 168 168 Reaction  Using a2 – Ratio Method
...Show More Authors

The -mixing of  - transition in Er 168 populated in Er)n,n(Er 168168  reaction is calculated in the present work by using a2- ratio method. This method has used in previou studies [4, 5, 6, 7] in case that the second transition is pure or for that transition which can be considered as pure only, but in one work we applied this method for two cases, in the first one for pure transition and in the 2nd one for non pure transitions. We take into accunt the experimental a2- coefficient for p revious works and -values for one transition only [1]. The results obtained are, in general, in agood agreement within associated errors, with those reported previously [1], the discrepancies that occur are due to inaccuracies existing

... Show More
Publication Date
Mon Jul 01 2013
Journal Name
Diyala Journal For Pure Sciences
Multipole Mixing Ratios for Gamma transitions in 56Fe populated in Reaction by using least square fitting method .
...Show More Authors

The γ- mixing ratios of γ- transitions from levels of 56Fe populated in reaction are calculated using least square fitting program for the first time in the case of pure and mixed transitions the results obtained have been compound with γ Values determined by other methods .The comparison shows that the agreement is good this confirmed the valilety of this method in calculating of values for such γ- transitions key word: γ- transition ,Multipole mixing ratios ,Least square fitting method.

Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
X.K.N: A Proposed Method for Data Encryption Using XOR and NOT Logical Gates with LFSR Generated Keys
...Show More Authors

In this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.

View Publication Preview PDF
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Genetic Variations of Echinococcus granulosus Isolated from Sheep and Cows by Using Fingerprint DNA Method in Iraq
...Show More Authors

The fingerprinting DNA method which depends on the unique pattern in this study was employed to detect the hydatid cyst of Echinococcus granulosus and to determine the genetic variation among their strains in different intermediate hosts (cows and sheep).  The unique pattern represents the number of amplified bands and their molecular weights with specialized sequences to one sample which different from the other samples.   Five hydatitd cysts samples  from cows and sheep were  collected, genetic analysis for  isolated DNA was done using PCR technique and  Random Amplified Polymorphic DNA reaction(RAPD) depending on (4) random primers, and the results showed:      

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
A Smishing Detection Method Based on SMS Contents Analysis and URL Inspection Using Google Engine and VirusTotal
...Show More Authors

    Smishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Synthesis of Silver Nanoparticles by ecofriendly nvironmental method using Piper nigrum, Ziziphus spina-christi, and Eucalyptusglobulus extract
...Show More Authors
Abstract<p>In the present study, silver nanoparticles (AgNPs) were prepared using an eco-friendly method synthesized in a single step biosynthetic using leaves aqueous extract of Piper nigrum, Ziziphus spina-christi, and Eucalyptus globulus act as a reducing and capping agents, as a function of volume ratio of aqueous extract(100ppm) to AgNO3 (0.001M), (1: 10, 2: 10, 3: 10). The nanoparticles were characterized using UV-Visible spectra, X-ray diffraction (XRD). The prepared AgNPs showed surface Plasmon resonance centered at 443, 440, and 441 nm for sample prepared using extract Piper nigrum, Ziziphus spina-christi, and Eucalyptus respectively. The XRD pattern showed that the strong intense peaks</p> ... Show More
View Publication
Scopus (13)
Crossref (4)
Scopus Crossref
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Craniofacial Surgery
Evaluation of the Trephine Method in Harvesting Bone Graft From the Anterior Iliac Crest for Oral and Maxillofacial Reconstructive Surgery
...Show More Authors

View Publication
Scopus (14)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon Apr 06 2020
Journal Name
Asian Journal Of Civil Engineering
Integrated project delivery (IPD) method with BIM to improve the project performance: a case study in the Republic of Iraq
...Show More Authors

View Publication
Scopus (16)
Crossref (17)
Scopus Crossref