Preferred Language
Articles
/
jmracpc-200
DETECTION OF HEAVY METALS POLLUTION INTYPES OF MILK SAMPLES IN BAGHDAD MARKETS: DETECTION OF HEAVY METALS POLLUTION INTYPES OF MILK SAMPLES IN BAGHDAD MARKETS
...Show More Authors

The levels of lead (pb), copper (cu), cobalt (co) and cadmium (cd) were determined in different kinds of milk and the health risks were evaluated. The mean levels were 0.73±0.21, 0.06±0.01, 0.12±0.01 and 0.14±0.01 ppm for these metals respectively. The levels of pb and cu were found to be insignificant differences (p<0.05), whereas the levels of co and cd, were no significant differences (p>0.05). The dry and liquid kinds of milk were different significantly (p<0.05), whereas the original, was no significant differences (p>0.05). The values for all metals were more than one. The metals pb and cd were detected at highest concentrations in most dry and liquid milk samples.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 08 2022
Journal Name
Mathematical Statistician And Engineering Applications
δ-Semi Normal and δ-Semi Compact Spaces
...Show More Authors

In this paper by using δ-semi.open sets we introduced the concept of weakly δ-semi.normal and δ-semi.normal spaces . Many properties and results were investigated and studied. Also we present the notion of δ- semi.compact spaces and we were able to compare with it δ-semi.regular spaces

View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Iraqi Journal Of Science
On Semiannahilator Supplement Submodules
...Show More Authors

Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes

Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Comparison between Horizontal and Vertical OFETs by Using Poly (3-Hexylthiophene) (P3HT) as an Active Semiconductor Layer
...Show More Authors

In this paper, a comparison between horizontal and vertical OFET of Poly (3-Hexylthiophene) (P3HT) as an active semiconductor layer (p-type) was studied by using two different gate insulators (ZrO2 and PVA). The electrical performance output (Id-Vd) and transfer (Id-Vg) characteristics were investigated using the gradual-channel approximation model. The device shows a typical output curve of a field-effect transistor (FET). The analysis of electrical characterization was performed in order to investigate the source-drain voltage (Vd) dependent current and the effects of gate dielectric on the electrical performance of the OFET. This work also considered the effects of the

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Fast Text Analysis Using Symbol Enumeration and Hashing Methodology
...Show More Authors

This paper is focusing on reducing the time for text processing operations by taking the advantage of enumerating each string using the multi hashing methodology. Text analysis is an important subject for any system that deals with strings (sequences of characters from an alphabet) and text processing (e.g., word-processor, text editor and other text manipulation systems). Many problems have been arisen when dealing with string operations which consist of an unfixed number of characters (e.g., the execution time); this due to the overhead embedded-operations (like, symbols matching and conversion operations). The execution time largely depends on the string characteristics; especially its length (i.e., the number of characters consisting

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
X.K.N: A Proposed Method for Data Encryption Using XOR and NOT Logical Gates with LFSR Generated Keys
...Show More Authors

In this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.

View Publication Preview PDF
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
Understanding Inclusion (National and International Perspective)
...Show More Authors

Abstract

There have been a number of positive developments in inclusive education in many different countries, recognizing that all students, including those with disabilities, have a right to education. Around the world, educators, professionals, and parents are concerned about including children with disabilities in mainstream schools along with their peers. As a result of this trend, a number of factors are contributing, including the increasing importance of education in achieving social justice for pupils with special education needs; the right of individuals with disabilities to attend mainstream schools together with their typically developing peers; the benefit of equal opportunities for everyone in achie

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Engineering
Determining and Predicting the Water Demand Dynamic System Model Mapping Urban Crawling and Monitoring Using Remote Sensing Techniques and GIS
...Show More Authors

The problem of rapid population growth is one of the main problems effecting countries of the world the reason for this the growth in different environment areas of life commercial, industrial, social, food and educational. Therefore, this study was conducted on the amount of potable water consumed using two models of the two satellite and aerial images of the Kadhimiya District-block 427 and Al-Shu,laa district-block 450 in Baghdad city for available years in the Secretariat of Baghdad (2005, 2011,2013,2015). Through the characteristics of geographic information systems, which revealed the spatial patterns of urban creep by determining the role and buildings to be created, which appear in the picture for the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Tasks Implemented by Internal Auditors when Developing and Executing Business Continuity and Recovery Plan to Face the COVID-19 crisis
...Show More Authors

The current research aimed to identify the tasks performed by the internal auditors when developing a business continuity plan to face the COVID-19 crisis. It also aims to identify the recovery and resuming plan to the business environment. The research followed the descriptive survey to find out the views of 34 internal auditors at various functional levels in the Kingdom of Saudi Arabia. Spreadsheets (Excel) were used to analyze the data collected by a questionnaire which composed of 43 statements, covering the tasks that the internal auditors can perform to face the COVID-19 crisis. Results revealed that the tasks performed by the internal auditors when developing a business continuity plan to face the COVID-19 crisis is to en

... Show More
View Publication Preview PDF
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
On Semiannahilator Supplement Submodules
...Show More Authors

Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 12 2025
Journal Name
International Journal Of Engineering &amp; Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref