Preferred Language
Articles
/
alkej-6
Design And Implementation of Microcontroller Based Curing Light Control of Dental System.
...Show More Authors

In this paper, a microcontroller-based electronic circuit have been designed and implemented for dental curing system using 8-bit MCS-51 microcontroller. Also a new control card is designed while considering advantages of microcontroller systems the time of curing was controlled automatically by preset values which were input from a push-button switch. An ignition based on PWM technique was used to reduce the high starting current needed for the halogen lamp. This paper and through the test result will show a good performance of the proposed system.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 29 2014
Journal Name
Information And Knowledge Management
Applying Electronic Commerce for a Proposed Virtual Organization
...Show More Authors

Virtual organization is similar to traditional organization in principles, but is different in the ways it operates. It requires small creation costs compared to the traditional and it uses electronic commerce as the market place and distribution channel for its products and services.The aim of this article is to applying electronic commerce for a proposed virtual organization. The tools used to build an effective web application for virtual organization to provide virtual environment to the customers to do the transaction activities online include PHP, MySQL and Apache. HTML is used for displaying forms and tables and JavaScript is used for verification in client side. Finally, connecting it to 2Checkout.com company as a third party to per

... Show More
Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Al–bahith Al–a'alami
The Electronic Advertising War Among the International Trading Companies
...Show More Authors

The use of the word “war” alone raises horror and fear in the hearts of the recipients, especially if this war aimed at human’s life, his health and his future. It is the electronic advertising war among rival international companies that use cyberspace to create fear and horror in the hearts of the recipients because it connects the use of the product with human’s death or serious illness.
The problem of this research sheds light on the new uses of cyberspace which fucked by international companies to strike the interests of each other by displaying the defects of their products and its negative impact on citizen’s life. Despite the fact that those wars have opposed strongly, there are supporters for those wars. Their argu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
International Journal Of Applied Mathematics & Statistical Sciences
Topological Structures Using Mixed Degree Systems in Graph Theory
...Show More Authors

This paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.

View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 15 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Health Educational Program on Nurses' Practices toward Chemotherapy-Induced Peripheral Neuropathy for Children at Hematology Center in Baghdad City
...Show More Authors

Objectives: the study aims to assess nurses' practices toward chemotherapy-induced peripheral neuropathy (CIPN) for children at the hematology center, and to determine the effectiveness of the health education program on nurses' practices toward CIPN, and to find out the relationships between the effectiveness of Health education program and demographic characteristics of nurses.

Methodology: Use quasi-experimental design in the study (a design that divides the sample into two groups, a study group and a control group, with data collection in three stages). This study was conducted at a hematology center in Baghdad city for the period (from December 16th, 2019 to 8th May 202

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Detection of human metapneumovirus RNA sequence in nasopharyngeal SWAP sample from children with acute respiratory tract infections in Najaf Province, Iraq
...Show More Authors

The purpose of this subject is to identify what is being studied in the article, which is the involvement of human Metapneumovirus in children with respiratory illnesses. During the period November 2020 to February 2021, 100 patients with respiratory tract infections were admitted to Al Zahra Teaching Hospital and AL-Forat AL-Awsat Teaching Hospital in Najaf Governorate. Nasopharyngeal swabs were collected from patients for molecular diagnosis of human metapneumovirus using Real-Time-PCR. The patients were distributed based on age into five groups as follows (Less than one, 1-2, 2-3, 3-4, and 4-5 years), and twenty samples of healthy individuals were approved as a control group without any clinical signs of infection. the children of age gr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed May 01 2024
Journal Name
Journal Of International Society Of Preventive And Community Dentistry
Effect of Incorporating Chitosan to Resin Modified Glass Ionomer Cement on Shear Bond Strength to Dentin (An In vitro Comparative Study)
...Show More Authors
A<sc>bstract</sc> <sec> <title>Aim:

Resin-modified glass ionomer cement tends to shrink due to polymerization of the resin component. Additionally, they are more prone to syneresis and imbibition during the setting process. This in vitro study evaluates the impact of chitosan, a biopolymer that is, both biomaterial and biocompatible, on the strength of dentin bonding and compares it with ACTIVA Bio-ACTIVE Restorative. The present study was aimed to assess the impact of including chitosan into Fuji II on the shear bond strength between. the restoration material and tooth dentin,

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Oct 02 2025
Journal Name
Jornal Of Al-muthanna For Agricultural Sciences
A Proposed Approach to Agricultural Extension in Iraq for a Better Response to the Needs of farmer’s to Address Their Challenges
...Show More Authors

View Publication
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
La réception du Petit Prince de Saint-Exupéry dans le monde arabe The impact of The Little Prince on Arabic audience
...Show More Authors

Le Petit Prince est apparu en 1943 vers la fin de la vie de son auteur. La mondialité qu'a gagnée ce récit le rend un des livres les plus lus et les plus vendus dans le monde. Cette popularité en fait un des classiques de la littérature française.

En effet la littérature française a un impact profond et direct sur la vie intellectuelle et littéraire dans le monde arabe. La circulation des œuvres littéraires écrites en français a bien influencé les lecteurs arabes soit en langue française  soit  traduites en arabe. Cette réalité est identique lorsqu'on parle de la réception du Petit Prince ; l'œuvre la plus connue dans le monde entier dès son apparition officielle.

Ab

... Show More
View Publication Preview PDF