Preferred Language
Articles
/
pBYjFYgBVTCNdQwCpXNv
A new class of K-uniformly starlike functions imposed by generalized Salagean’s operator
...Show More Authors

Recently, numerous the generalizations of Hurwitz-Lerch zeta functions are investigated and introduced. In this paper, by using the extended generalized Hurwitz-Lerch zeta function, a new Salagean’s differential operator is studied. Based on this new operator, a new geometric class and yielded coefficient bounds, growth and distortion result, radii of convexity, star-likeness, close-to-convexity, as well as extreme points are discussed.

Scopus Crossref
Preview PDF
Quick Preview PDF
Publication Date
Wed May 01 2019
Journal Name
The Iraqi Journal For Information And Documentation Studies
The role and importance of scientific research in creating new knowledge and its impact on developing the cognitive capabilities of information and librarians and their Employees
...Show More Authors

The research aims at identifying the importance of scientific research for researchers and in creating new knowledge، development and utilization of mental and cognitive energies and developed them with the ability to research، extrapolation، meditation and then conclusion. The information was collected by interviewing the Secretary-General of the Central Library and by distributing questionnaire forms to the (33) teaching staff of the College of Higher Education. The responses of the society were analyzed the result and the recommendations were the most important 1. Information specialist and all employees of the administrators and technicians in the centers of information sources (libraries) and in the field are considered scientific r

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 07 2014
Journal Name
Chemistry And Materials Research
Synthesis and Charactrization of New Schiff Base Derived from PVA and Erythroascorbic Acid Derivative and Study Its Effect on the Activity of ACh Enzyme (In Vitro)
...Show More Authors

Schiff base derived from PVA and Erythroascorbic acid derivative (pentulosono-ɣ-lactone-2, 3-enedianisoate) was synthesized and characterized by Thin Layer Chromatography (TLC) and FTIR spectra, aldehyde was also characterized by (U.V-Vis), 1HNMR, 13CNMR and mass spectra. The inhibitory effect of prepared polymer on the activity of human serum Cholinesrerase has been studied in vitro. The polymer showed a remarkable activity at low concentration (4.5*10-3 – 4.5*10-8 M).

Publication Date
Sun Jun 01 2025
Journal Name
Journal Of The College Of Languages (jcl)
Rebellious Self - A Reading in Madame Bovary's Character of Flubert and Hanna Konin by Amos Oz - Comparative study: האני המורדת - קריאה בדמותה של מאדאם בובארי של פלובר וחנה גונן של עמוס עוז – מחקר השוואתי
...Show More Authors

The problem of rebellion is considered one of the features of rapid changes that a society undergoes in all spheres and directions of life, especially in the realm of social relations, customs, traditions, values, and principles. Rebellion may manifest itself in rebellion against oneself, against values or traditions, or against social or governmental authority. One may find that submission plays a vital role in all of these interactions. This study deals with the problem of rebellion in the works of two renowned authors: The French Gustave Flaubert and the Israeli Amos Oz, through two main characters who share similar qualities and traits. Emma Bovary and Henna Konin demonstrate this through their rebellion against themselves, their relati

... Show More
View Publication
Publication Date
Sat Aug 01 2020
Journal Name
Key Engineering Materials
Effect of Coefficient of Variation on the Reliability of Collapse Potential's Equation Predicted by ANNs
...Show More Authors

In this paper, the Reliability Analysis with utilizing a Monte Carlo simulation (MCS) process was conducted on the equation of the collapse potential predicted by ANN to study its reliability when utilized in a situation of soil that has uncertainty in its properties. The prediction equation utilized in this study was developed previously by the authors. The probabilities of failure were then plotted against a range of uncertainties expressed in terms of coefficient of variation. As a result of reliability analysis, it was found that the collapse potential equation showed a high degree of reliability in case of uncertainty in gypseous sandy soil properties within the specified coefficient of variation (COV) for each property. When t

... Show More
View Publication
Scopus Crossref
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Science
Investigation of nanostructured and gas sensing of tin dioxide films prepared by oxidation of Sn
...Show More Authors

Publication Date
Tue Jan 01 2008
Journal Name
J Bagh College Of Dentistry
Assessment of consistency and compressive strength of glass ionomer reinforced by different amount of hydroxyapatite
...Show More Authors

Background: Glass ionomers have good biocompatibility and the ability to adhere to both enamel and dentin. However, they have certain demerits, mainly low tensile and compressive strengths. Therefore, this study was done to assess consistency and compressive strength of glass ionomer reinforced by different amount of hydroxyapatite. Materials and Methods: In this study hydroxyapatite materials were added to glass ionomer cement at different ratios, 10%, 15%, 20%, 25% and 30% (by weight). The standard consistency test described in America dental association (ADA) specification No. 8 was used, so that all new base materials could be conveniently mixed and the results would be of comparable value and the compressive strength test described by

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Current Science
Histopathological changes in golden hamsters induced by Leishmania tropica
...Show More Authors

.

Preview PDF
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Estimate The Survival Function By Using The Genetic Algorithm
...Show More Authors

  Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More