Preferred Language
Articles
/
QxY1qYcBVTCNdQwCSFrf
The relationship between conceptual knowledge and procedural knowledge among students of the mathematics department at the faculty of education for pure sciences/IBn Al-Haitham, university of Baghdad
...Show More Authors

Scopus
Publication Date
Sun Jan 01 2017
Journal Name
Food And Nutrition Sciences
Optimization of Culture Conditions to Produce Phytase from <i>Aspergillus tubingensis SKA</i>
...Show More Authors

The effects of nutrients and physical conditions on phytase production were investigated with a recently isolated strain of Aspergillus tubingensis SKA under solid state fermentation on wheat bran. The nutrient factors investigated included carbon source, nitrogen source, phosphate source and concentration, metal ions (salts) and the physical parameters investigated included inoculum size, pH, temperature and fermentation duration. Our investigations revealed that optimal productivity of phytase was achieved using wheat bran supplemented with: 1.5% glucose. 0.5% (NH4)2SO4, 0.1% sodium phytate. Additionally, optimal physical conditions were 1 × 105 spore/g substrate, initial pH of 5.0, temperature of fermentation 30˚C and fermentation dura

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
International Journal Of Dentistry
Bond Strength Survival of a Novel Calcium Phosphate-Enriched Orthodontic Self-Etching System after Various Ageing Protocols: An In Vitro Study
...Show More Authors

Objective. This study aimed to evaluate the orthodontic bond strength and enamel-preserving ability of a hydroxyapatite nanoparticles-containingself-etch system following exposure to various ageing methods. Materials and Methods. Hydroxyapatite nanoparticles (nHAp) were incorporated into an orthodontic self-etch primer (SEP, Transbond™ plus) in three different concentrations (5%, 7%, and 9% wt) and tested versus the plain SEP (control) for shear bond strength (SBS), adhesive remnant index (ARI) scores, and enamel damage in range-finding experiments using premolar teeth. The best-performing formulation was further exposed to the following four artificial ageing methods: initial debonding, 24 h water storage, one-month water stora

... Show More
View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Biochemical And Cellular Archives
Immunohistochemical evaluation of epidermal growth factor expression in skin wound treated by capparis spinosa flavonoid extract in alloxan induced diabetes rats
...Show More Authors

In diabetes, impaired wound healing and other tissue abnormalities are considered major concerns. Many factorsaffect the time and quality of wound healing. One of the purposes of medical sciences is wound healing in a short time withreduced side effects. The herbal products are more precious in both prophylaxis as well as curative in delayed diabetic woundhealing activity when compared to synthetic drugs.A wide range of evidence has shown that capers plant possesses differentbiological effects, including antioxidant, anticancer and antibacterial effects. Phytochemical analysis shows thatC. spinosahashigh quantities of bioactive constituents, including polyphenolic compounds, which are responsible for its health-promotingeffects. The healing

... Show More
Scopus (5)
Scopus
Publication Date
Mon May 01 2023
Journal Name
Chemical Engineering Research And Design
Treatment of petroleum refinery wastewater by electrofenton process using a low cost porous graphite air-diffusion cathode with a novel design
...Show More Authors

View Publication
Scopus (34)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Land Magnetic survey along a profile from Akaz to Rutba town and its applications
...Show More Authors

A land magnetic survey was carried out along regional profile, which is located at the north part of the Iraqi western desert. It starts from al –Qaam City (at north) toward Rutba City (at south) with a total length of 238km. The survey was carried out along the paved road between the two cities, About 113 measuring points were done with inter-station distance of 2 km (for 198 km) and 2 to 5km (for 40km). Two proton magnetometers were used in this survey. One of them is used for base station monitoring, which was fixed as of Salah Aldin field (Akkas). Its readings were used for diurnal corrections. All magnetic measurements were corrected for normal and topographic corrections. The readings were reduced to a certain base level. The resu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 23 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Exploitation decision and impact factors in improvement in stock exchange markets proportion investment small
...Show More Authors

The purpose of the search definition on factors superior this whoever  impact on the improvement the exploitation  decision this  detect on stock exchange markets  assumption , and using  questioners to data accumulate  and the Iraq market of financial papers  battleground to search annoy chose the eyeball extension (47) peoples from peoples employees on the market , and using the bought statistic program (SPSS) on input and analysis search  data , and machinate the search outputs to their group of factors internal and external which impact on exploitation  decision on financial papers markets , and the search commend on necessary rise  the incumbency direction  in the stock exchange

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Network Self-Fault Management Based on Multi-Intelligent Agents and Windows Management Instrumentation (WMI)
...Show More Authors

This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Chromosomal aberrations and N-ras activation in human larynx carcinoma cell line Hep-2.
...Show More Authors

In the present study, cytogenetic and molecular techniques were conducted to detect the chromosomal aneuploidy and the involvement of N and H genes in squamous larynx carcinoma cell line Hep-2.Our results showed that numerical and structural abnormalities were involved in larynx cancer Hep-2.The total number of chromosomes ranging from tripolyploidy in passage187to more than that in passage207.The more frequent chromosomes involved in numerical aberrations were chromosomes1,7,16,17 and 18. Structural chromosomal aberrations were also detected.Deletion of short arm was detected in chromosome 1(del 1p) and the long arm of chromosome 1(del 1q)and 6(del 6q).Gaining on short arms were also recorded in chromosomes 3(3p+) and 12(12p+).At the mole

... Show More
View Publication Preview PDF
Crossref