Preferred Language
Articles
/
pRaPd4cBVTCNdQwCM1Px
Fuzzy Topological Spectrum of a KU-Algebra
...Show More Authors
Abstract<p>In the present paper, discuss the concept of fuzzy topological spectrum of a bounded commutative KU-algebra and study some of the characteristics of this topology. Also, we show that the fuzzy topological spectrum of this structure is compact and T<sub>1</sub> -space.</p>
Scopus Crossref
View Publication
Publication Date
Tue Oct 01 2024
Journal Name
Journal Of Physics: Conference Series
A comparative Analytical Investigation of Different Geomagnetic Storms During Solar Cycles 23 and 24
...Show More Authors
Abstract<p>In this work, the geomagnetic storms that occurred during solar cycles 23 and 24 were classified based on the value of the Disturbance Storm Time index (Dst), which was considered an indicator of the strength of geomagnetic conditions. The special criterion of Dst >-50 nT was adopted in the classification process of the geomagnetic storms based on the minimum daily value of the Dst-index. The number of geomagnetic storms that occurred during the study period was counted according to the adopted criteria, including moderate storms with (Dst >-50 nT), strong storms with (Dst >-100 nT), severe storms with (Dst >-200 nT), and great storms with (Dst >-350 nT). The statistica</p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Transylvanian Review
POSSIBILITY OF APPLICATION THE BALANCED SCORECARD IN THE IRAQI INDUSTRIAL COMPANIES: A PROPOSED MODEL
...Show More Authors

POSSIBILITY OF APPLICATION THE BALANCED SCORECARD IN THE IRAQI INDUSTRIAL COMPANIES: A PROPOSED MODEL

Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Peptide Science
Studies on the antileishmanial properties of the antimicrobial peptides temporin A, B and 1Sa
...Show More Authors

Given the paucity and toxicity of available drugs for leishmaniasis, coupled with the advent of drug resistance, the discovery of new therapies for this neglected tropical disease is recognised as being of the utmost urgency. As such antimicrobial peptides (AMPs) have been proposed as promising compounds against the causative Leishmania species, insect vector-borne protozoan parasites. Here the AMP temporins A, B and 1Sa have been synthesised and screened for activity against Leishmania mexicana insect stage promastigotes and mammalian stage amastigotes, a significant cause of human cutaneous disease. In contrast to previous studies with other species the activity of these AMPs against L. mexicana amastigotes was low. This suggests that ama

... Show More
View Publication
Scopus (28)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Theory And Practice In Language Studies
Prosodic Cues of Narrative Segmentation in Robert Frost’s ‘Mending Wall’: A Phono-Pragmatic Exploration
...Show More Authors

There is much research on the syntax-semantics and the syntax-phonology interaction. However, the exact relation between prosodic patterns and informational structure (as part of pragmatics) is still to be investigated. In this empirical study, we challenge the view that prosody and pragmatics are two autonomous levels of grammar. This paper is an analysis of the narrative poem ‘Mending Wall’ recited by Robert Frost to explore the prosodic features and the associated pragmatic meanings. It is proposed that a set of intentionally manipulated suprasegmental features form a prosodic grammar that works in line with syntax and lexical choices to build the narrative discourse and achieve pragmatic meanings. The paper shows that the am

... Show More
View Publication
Publication Date
Mon Mar 04 2024
Journal Name
Journal Of Emergency Medicine, Trauma And Acute Care
A comparative immunohistochemical expression of cytokeratin 19 in odontogenic keratocyst, dentigerous, and radicular cysts
...Show More Authors

Background: Odontogenic cysts are characterized by their sluggish growth and ability to enlarge, primarily affecting the oral and maxillofacial tissues. Timely diagnosis and treatment are crucial to prevent potentially serious consequences. The present study aimed to evaluate and compare the immunohistochemical expression of cytokeratin 19 in the epithelium of odontogenic keratocyst, dentigerous, and radicular cysts.

Methods: This study analyzed forty-five formalin-fixed, paraffin-embedded tissue blocks containing odontogenic cysts. The sample consisted of fifteen odontogenic keratocysts, fifteen dentigerous cysts, and

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Dec 03 2014
Journal Name
Al-kindy College Medical Journal
Limping in twenty years old male A Case Report
...Show More Authors

Background: Osteoid osteoma(OO) is a relatively common benign skeletal neoplasm of unknown etiology that is composed of osteoid and woven bone, usually seen in adolescent and young males Although, the clinical, radiological and scintigraphic features of OO have been well described, these features may be misleading or altered in the cases of lesser trochanter of the femur which is relatively uncommon location for OO with a few number of cases reported up to date. Case Presentation: We report a case of a 20-year-old man who presented with painful limpThe pain had begun six months earlier and was made worse by walking and by exercise., with normal initial X-rays .The diagnosis was made after six months when typical Computed tomography, magneti

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
International Journal Of Artificial Intelligence And Mechatronics
Building a Three-Axis CNC Milling Machine Control System
...Show More Authors

CNC machines are widely used in production fields since they produce similar parts in a minimum time, at higher speed and with possibly minimum error. A control system is designed, implemented and tested to control the operation of a laboratory CNC milling machine having three axes that are moved by using a stepper motor attached to each axis. The control system includes two parts, hardware part and software part, the hardware part used a PC (works as controller) connected to the CNC machine through its parallel port by using designed interface circuit. The software part includes the algorithms needed to control the CNC. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD or 3D MAX and is saved in a we

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Proceedings Of The Eleventh International Network Conference (inc 2016)
A review on power consumption reduction techniques on OFDM
...Show More Authors

Scopus (2)
Scopus
Publication Date
Wed Nov 11 2020
Journal Name
Sys Rev Pharm
Recent Development In Oxine Complexes AndTheirMedical Application: A Review
...Show More Authors

This review is concluded of 8-Hydroxyquinline (8HQ) compound and derivatives which has a very significant interests with a strong fluorescence , furthermore the relationship between divalent metal ions and characteristic of chelating . In the same way coordinated features have increase of its organic action and inorganic behavior by giving many samples of compounds which are a good chelating agents ligands with more capable of forming very stable complexes.Therefore, the role of (8HQ) is not limited on complexes only but its applications in different fields so this review will focus on demonstration preparation methods and properties of (8HQ) derivatives with their complexes and applications, hopefully that we will cover a part of scientifi

... Show More
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref