Preferred Language
Articles
/
-Re2QJMBVTCNdQwCs8_U
Carbon Sources and Riverine Algal Biomass: An Experimental Study
...Show More Authors

A lotic ecosystem is considered a source of carbon dioxide (CO2) in the atmosphere where it becomes supersaturated with CO2, which contributes to the global carbon cycle. To enhance our comprehension of the roles of CO2 in rivers, an outdoor experiment was designed with controlled carbon source inputs to investigate the roles of the dissolved organic carbon (DOC) and dissolved inorganic carbon (DIC) in the phytoplankton community. Plastic enclosures were installed in the Tigris River within Baghdad for that goal. Samples were collected on the first day, as well as on the 5th and the 12th days from 14 enclosures. The enclosures were treated by artificial glucose (C6H12O6) (10, 20, 30mg/ l) as DOC sources, while sodium bicarbonate (NaHCO3) (10, 20, 30μM) was used as a DIC source. The results showed that the concentration of nitrate (NO3 -) and phosphate (PO4 3-) changed over time and weren’t affected by the treatments. On the other hand pH, DOC, and CO2 concentrations were affected by treatments. Moreover, our results indicated that DOC and DIC treatments had a direct impact on phytoplankton biomass growth via increasing chlorophyll (Chl) concentration. Overall, it was concluded that different carbon sources (DOC and CO2) could be essential factors that shape river ecosystems function through influencing the base of food webs.

Scopus Crossref
View Publication
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Derivative of an image that corrupted by additive noise
...Show More Authors

In this paper the behavior of the quality of the gradient that implemented on an image as a function of noise error is presented. The cross correlation coefficient (ccc) between the derivative of the original image before and after introducing noise error shows dramatic decline compared with the corresponding images before taking derivatives. Mathematical equations have been constructed to control the relation between (ccc) and the noise parameter.

View Publication Preview PDF
Crossref
Publication Date
Thu Jul 18 2019
Journal Name
Annals Of Tropical Medicine & Public Health
SURVIVIN TARGETING; AN IN SILICO APPROACH FOR ANTICANCER DESIGN
...Show More Authors

Survivin, a member of inhibitor of apoptosis family is increasingly used as a target for cancer therapy design because it has a key role in cell growth and inhibition of cell apoptosis. Also it can be used as a biomarker for targeting cancer because it is found in almost all cancer but not normal cells. Our strategy was to design (computationally) a molecule to be used as survivin inhibitor. This molecule was named lead10 and was used furthermore to find (virtually) existing drugs with a good survivin inhibition activity.

Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
NATURAL CONVECTION HEAT TRANSFER IN AN INCLINED CIRCULAR CYLINDER
...Show More Authors

Experiments were carried out to investigate natural convection heat transfer in an inclined uniformly heated circular cylinder . The effects of surface heat flux and angle of inclination on the temperature and local Nusselt number variations along the cylinder surface are discussed . The investigation covers heat flux range from 92 W/m² to 487 W/m², and angles of inclination 0° ( horizontal) , 30° , 60° and 90° (vertical) . Results show an increase in the natural convection as heat flux increases and as angle of inclination moves from vertical to horizontal position. An empirical equation of average Nusselt number as a function of Rayliegh number was deduced for each angle of inclination .

View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Dental Materials
An integrated multifunctional hybrid cement (pRMGIC) for dental applications
...Show More Authors

Objective. Glass-ionomer and resin-modified glass-ionomer cements are versatile materials with the ability to form a direct bond with tooth tissues. The aim of this study was to formulate a novel class of dental bio-interactive restorative material (pRMGIC) based on resin-modified glass-ionomer cements via the inclusion of an organophosphorus monomer, ethylene glycol methacrylate phosphate, with a potential to improve the mechanical properties and also function as a reparative restorative material. Methods. pRMGIC was formulated with modification of the resin phase by forming mixes of ethylene glycol methacrylate phosphate (EGMP; 0–40%wt) and 2-hydroxyethyl methacrylate monomer into the liquid phase of a RMGIC (Fuji II LC, GC Corp.).

... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 08 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
An Epidemiological Approach of Hydrocephaly Parameters in Duhok Province
...Show More Authors

Objective(s): This study was conducted to deal with the importance and effect of various variables which might
have influence in hydrocephaly occurrence.
Methodology: A retrospective design was performed and continued for 4 months. It included 89 nonrandomized
consecutive samples collected from the Early Detection of Childhood Disabilities Center (E.D.C.D.C.)
Duhok. The population involved was the entire cases of both sexes that attended the centre during the period from
1
st.Jan, 1998 to 30th. Dec. 2008 with final diagnosis of hydrocephaly. Patients’ records from the centre were used to
collect data.
Results: Hydrocephaly has been recognized as a public health problem in Duhok province, Iraqi Kurdistan region,<

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2007
Journal Name
Al-khwarizmi Engineering Journal
An Investigation into the Behavior of Disc Blake Wear
...Show More Authors

A real method of predication brake pad wear ,could lead to substantiol economies of time and money. This paper describes how such a procedure has been used and gives the results to establish is reliability by comparing the predicted wear with that which actually occurs in an existing service. The experimental work was carried out on three different commercial samples ,tested under different operation conditions (speed,load,time...etc)using a test ring especially modified for this purpose. Abrasive wear is mainly studied , since it is the type of wear that takes place in such arrangements. Samples wear tested in presences of sand or mud between the mating surfaces under different operational conditions of speed, load and braking time .Mec

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
Methods of Achieving Mental Health from an Islamic Perspective
...Show More Authors

The aim of the research is to identify the methods of achieving mental health from an Islamic perspective by using an analytical approach. The methods that were explained: strengthen the spiritual side to control the motives and emotion s overcome the whims of the soul, fear of God and treat mental illness from an Islamic point of view by recognizing self, assurance, foresight, learning and acquiring new trends. Conclusion: we can achieve mental health by optimism, not despair, the compatibility of the Muslim with himself and with others, Consistency, emotional balance, and patience in difficult situations. Islam has attributes that make an individual feels    psychological security. Thus, all these elements achiev

... Show More
View Publication Preview PDF