Preferred Language
Articles
/
shc2a44BVTCNdQwCb0f3
Confronting the holder of the mortgaged property with the authority of the mortgagee in the pursuit
...Show More Authors

View Publication
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
New Method for the Determination of DL-Histidine by FIA and Chemiluminometric Detection
...Show More Authors

This paper present a simple and sensitive method for the determination of DL-Histidine using FIA-Chemiluminometric measurement resulted from oxidation of luminol molecule by hydrogen peroxide in alkaline medium in the presence of DL-Histidine. Using 70?l. sample linear plot with a coefficient of determination 95.79% for (5-60) mmol.L-1 while for a quadratic relation C.O.D = 96.44% for (5-80) mmol.L-1 and found that guadratic plot in more representative. Limit of detection was 31.93 ?g DL-Histidine (S/N = 3), repeatability of measurement was less that 5% (n=6). Positive and negative ion interferances was removed by using minicolume containing ion exchange resin located after injection valve position.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 31 2006
Journal Name
Journal Of Engineering
Theoretical Simulation Of Stress-Strain Relations For Some Iraqiclays Using The Endochronic Model
...Show More Authors

Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Calculate the one – expectation to electronic charge of atomic system contiun two electron
...Show More Authors

The aim of this work is to calculate the one- electron expectation value of the electronic charge of atomic system Z=2,3….7 and we compare with He atom . the electronic density function D(r1) of He atom and like ions are evaluated . using Hartree –Fock wave.

View Publication Preview PDF
Crossref
Publication Date
Sat Jul 20 2024
Journal Name
Sumer Journal For Pure Science
Classify the Nutritional Status of Iraqi children under Five Years Using Fuzzy Classification
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Alexandria Engineering Journal
The operational matrix of Legendre polynomials for solving nonlinear thin film flow problems
...Show More Authors

View Publication
Crossref (9)
Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
The Preparation of some New Mannich and Shiff bases derived from 2-Mercaptobenzimidazole
...Show More Authors

The present work involved two steps: the first step include Mannich reaction was carried out on 2- mercaptobenzimidazole using formaldehyde and different secondary amine or amide to gives the compounds(2-16). The secnd step include preparation of (Ethylbenzimidazoly-2-mercaptoacetate)(17) from the reaction of 2- mercaptobenzimidazole with ethylchloroacetate than prepared hydrazide derivative[18]from reaction of compound(17) with hydrazinehydrate. Followed Preparation of shiff bases(19-24) and there reaction with mercaptoacetic acid to give a new compounds containing thiazolidinderivetives(25-30).Structure confirmation of all prepared compound were proved using FTIR and element analysis (C.H.N.S) and mesurmentedmelting poi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Opcion
Analysis of Computer Textbook for the Second Intermediate Grade According to Digital Citizenship
...Show More Authors

The research aims to build a list of digital citizenship axes and standards and indicators emanating from them, which should be included in the content of the computer textbook scheduled for second grade intermediate students in Iraq, and the analysis of the above mentioned book according to the same list using the descriptive analytical method ((method of content analysis)). The research community and its sample consisted of the content of the computer textbook scheduled for the second year intermediate students for the academic year 2018-2019, and the research tool was built in its initial form after reference to a set of specialized literature and previous studies that dealt with topics related to digital citizenship, and the authenticit

... Show More
Preview PDF
Publication Date
Fri Sep 01 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Assessing the Radiopacity of Three Resin Composite Materials Using a Digital Radiography Technique
...Show More Authors

Background: Radiopacity is one of the prerequisites for dental materials, especially for composite restorations. It's essential for easy detection of secondary dental caries as well as observation of the radiographic interface between the materials and tooth structure. The aim of this study to assess the difference in radiopacity of different resin composites using a digital x-ray system. Materials and methods: Ten specimens (6mm diameter and 1mm thickness) of three types of composite resins (Evetric, Estelite Sigma Quick,and G-aenial) were fabricated using Teflon mold. The radiopacity was assessed using dental radiography equipment in combination with a phosphor plate digital system and a grey scale value aluminum step wedge with thickness

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2024
Journal Name
International Education And Culture Studies (iecs)
The Impact of Virtual Trips on Lateral Thinking and Middle School Student’s Achievement
...Show More Authors

Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref