Preferred Language
Articles
/
yBfGS44BVTCNdQwCIEBC
Proposed Exercises Using Flexible Resisters And Their Effect On Developing Strength Endurance And The Performance of Some Offensive Skills In Youth Basketball
...Show More Authors

View Publication
Publication Date
Thu Jul 01 2004
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
THE PARASITIC FAUNA AND THE FOOD HABITS OF THE WILD JUNGLE CAT FELIS CHAUS FURAX DE WINTON, 1898 IN IRAQ
...Show More Authors

A total of 72 specimens of the wild jungle cat Felis chaus furax De Winton, 1898 were
examined for the purpose of this study. The results show that 55.6% of the sample harbored
either single or mixed infections with ecto- and/ or endoparasites. The mode of infection
shows that only four specimens( 5.6% of the total sample) acquire single infections, the
double infections comprise 15.3%, the triple infections comprised 33.3%, while the
quadruplicate infections comprised 1.4%.
The systematic list of the parasites included six ectoparasites: Ctenocephalides felis (insect),
Sarcoptes scabiei (mite), Haemaphysalis adleri, Rhipicephalus leporis, Rhipicephalus
turanicus and Hyalomma anatolicum excavatum (ticks) and seven

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 16 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
English Influence of Workplace Incivility on Psychological Well-being of Nurses in the Southern of Iraq
...Show More Authors

Abstract

Objectives: The main objective of this study is to find the influence level of nursing incivility on psychological well-being among nurses in southeastern Iraq.

Methods: In this descriptive correlational study, a convenience sample of 250 nurses working in three government hospitals in Missan province in the south of Iraq were surveyed using the nursing incivility scale (NIS) and Ryff's psychological well-being scale (PWB) from November 2021, to July 2022. A multivariate multiple regression analysis was done to analyze the multivariate effect of workplace incivility on the psychological well-being of nurses.

Results: The study results show a

... Show More
View Publication Preview PDF
Publication Date
Thu May 01 2014
Journal Name
European Journal Of Pharmacology
The effects of different doses of silibinin in combination with methotrexate on testicular tissue of mice
...Show More Authors

Methotrexate (MTX) is widely used chemotherapeutic agent with different side effects including germ cells toxicities. Silibinin is one of the structural isomers of silymarin, with different phytotherapeutic applications, and its possible protective effects against MTX induced germ cells damage were investigated in this work. Twenty five male mice were divided into five groups (n=5) allocated as follows: Group 1 received buffer for five days given by single intraperitoneal (IP) injection per day; Group 2 in addition to buffer for five days, animals received at day five single dose of 20mg/kg of MTX IP. Groups (3, 4, and 5) received respectively, (50, 100, or 150mg/kg body weight) of silibinin IP single daily dose for five days then at day fi

... Show More
View Publication
Scopus (26)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Solid State Chemistry
Stabilization of Pt nanoparticles within MOFs for selective hydrogenation of hazardous 4-nitrophenol to valuable 4-aminophenol: Confinement and synergistic effect
...Show More Authors

View Publication
Scopus (24)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Tue Jul 18 2023
Journal Name
Journal Of Current Researches On Social Sciences
A Study on Sociocultural Features among Turkish and Iraqi Women
...Show More Authors

SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023

View Publication
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Research Journal Of Pharmacy And Technology
Bacteriological and molecular study on S. Aureus bacteria Atala, M.L.
...Show More Authors

Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
CFD Application on Shell and Double Concentric Tube Heat Exchanger
...Show More Authors

This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).

Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors.  The RNG k-ε model of turbulence is used to determining the accurate results from CFD.

The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o

... Show More
View Publication Preview PDF
Crossref (3)
Crossref