Preferred Language
Articles
/
jmracpc-253
PHYSIO-CHEMICAL ANALYSIS OF SAMPLES OF SOIL SELECTED FROM DIFFERENT AGRICULTURE AREAS FROM AL-NAJAF: PHYSIO-CHEMICAL ANALYSIS OF SAMPLES OF SOIL SELECTED FROM DIFFERENT AGRICULTURE AREAS FROM AL-NAJAF
...Show More Authors

The twelve samples of agricultural soils from four regions in Al-Najaf governorate with sampling plant with soil. Physical properties of the soil where studied, such as electrical conductivity ranged from (136.33-1070.00)μS/cm-3, and moisture which ranged between the values (0.39-36.48)%. The chemical analysis of the soil have included the proportion of calcium carbonate the ratio between (44.00-48.00%) has been observed increasing amounts of calcium carbonate in surface models. The pH where results indicate that pH values ​​were close to study models ranged between (6.88-7.42) these values ​​generally within the normal range for the measured pH values ​​of the Iraqi soil. The amount of gypsum ranged between the (1.36-4.32meq/100g) proportion of organic matter in the soils studied models was high compared with the percentage of which is supposed to good soils for plant growth and the extent of the proportion of organic matter between (3.31-30.22%). As well as the estimation of heavy metals in the soil, samples were arranging as follows: (Fe> Cr>Mn> Zn>Pb> Cu> Cd). As arranged in the plant as follows: Fe>Mn>Pb> Zn> Cr> Cu> Cd.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2016
Journal Name
Iraqi Journal Of Physics, 2016
Energy transfer process between two laser compounds coumarin 334 & rhodamine 590
...Show More Authors

Abstract: In the current research the absorption and fluorescence spectrum of Coumarin (334) and Rhodamine (590) in ethanol solvent at different concentration (10-3, 10-4, 10-5) M had been studied. The absorption intensity of these dyes increases as the Concentration increase in addition to that the spectrum was shifted towards the longer wavelength (red shift). The energy transfer process has been investigated after achievement this condition. The fluorescence peak intensity of donor molecule was decrease and its bandwidth will increases on the contrary of the acceptor molecule its intensity increase gradually and its bandwidth decreases as the acceptor concentration increase.

Preview PDF
Publication Date
Mon Dec 01 2008
Journal Name
Iraqi Journal Of Physics,2008
optical pulse propagation in photonic bandgap fiber Bragg grating
...Show More Authors

Abstract: In this work we demonstrate and investigate the optical pulse propagation in a photonic band gap fiber Bragg grating (FBG). The light propagates in opposite direction in FBG is explained and discussed by a Coupled Mode Theory (CMT). The photonic band gap (stop band gap) is created by fabricated, a Bragg grating in optical fiber. The results show the pulse spectrum falls entirely within the stop band gap, the entire pulse is reflected by the grating, while when the pulse spectrum is outside the stop band gap the pulses will transmitted through the grating. The group velocity (VG) becomes zero at the edges of the stop band and group velocity dispersion β2 is anomalous on the shorter side of stop band gap whereas β2 for uniform fi

... Show More
Preview PDF
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 18 2019
Journal Name
Iraqi Journal Of Science
Simple Colorimetric Method Using Aqueous Solution to Detect Heavy Metal
...Show More Authors

Simple method has been used to determine the absence of heavy metals in an aqueous solution. Fluorescein was used as the base colorimetric materialThis was doped with CuCl2 and the final solution showeda clear change in color. This change was correlated with the change in both pH and electrical conductivity of the solution. The optical property as an obvious change of the spectra was observed. Therefore, this simple method could be proposed as a method to detectheavy metals in any solution.

View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detecting Textual Propaganda Using Machine Learning Techniques
...Show More Authors

Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation.  Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Vehicle Indoor Air pollution with Fungi Generated by Air Conditioning Systems (AC) and Treatment by Using Aqueous Extracts Mushroom (Ganoderma lucidum)
...Show More Authors

Vehicle Air Conditioning (AC) systems are used in countries that suffer high temperature degrees during the summer season, one of these countries is Iraq. Most passengers suffer manifestations which may lead to Allergic or Respiratory diseases as they inhale polluted air produced by AC systems.
In this study 10 vehicle were selected randomly on the basis of noxious odors emitted from AC systems. Indoor air samples were collected by using impaction method and using Sabouraud's dextrose agar to grow and isolate dominant fungi species accompanied with AC polluted air. Dust particle diameters aggregated in AC filters were measured because the particles work as transporters to carry fungi then get inhaled by the passengers. After isolating

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 29 2021
Journal Name
Iraqi Journal Of Science
Heavy Metal Pollution and Ecological Risk Assessment in Soils Adjacent to Electrical Generators in Ramadi City, Iraq
...Show More Authors

     This study aims to evaluate the concentration of the heavy metals (Co, Cd, Cr, Cu, Ni, Pb, and Zn) and their ecological risk in soils adjacent to the power generators of Ramadi city, Iraq. The soil samples were collected from a depth of 20cm. The obtained results showed that the mean concentrations of heavy metals (HMs) are ranked as in the following order: Cr (360.90mg/kg) > Ni (283.65mg/kg) > Zn (190.96mg/kg) > Pb (130.75 mg/kg) > Cu (36.54 mg/kg) > Co (16.62 mg/kg) > Cd (2.55 mg/kg). The mean values of HMs concentration exceed the international guidelines. The result of correlation matrix analysis at P £ 0.05 showed significant correlations between the concentrations of HMs. These correlatio

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
A Secure Private Key Recovery Based on DNA Bio-Cryptography for Blockchain
...Show More Authors

     The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
A Modified Key Scheduling Algorithm for RC4
...Show More Authors

Rivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with

... Show More
View Publication Preview PDF