Preferred Language
Articles
/
bsj-4639
New Common Fixed Points for Total Asymptotically Nonexpansive Mapping in CAT(0) Space
...Show More Authors

      Strong and ∆-convergence for a two-step iteration process utilizing asymptotically nonexpansive and total asymptotically nonexpansive noneslf mappings in the CAT(0) spaces have been studied. As well, several strong convergence theorems under semi-compact and condition (M) have been proved. Our results improve and extend numerous familiar results from the existing literature.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 05 2017
Journal Name
Int’l Journal Of Advances In Chemical Engg., & Biological Sciences
Morpho-taxonomic Study of Tabanus indrae Hauser, 1939 (Diptera: Tabanidae). New Record for Iraq
...Show More Authors

This work was included external morphological study of horse fly Tabanus indrae Hauser 1939 new record in Iraq, which belongs to family: Tabanidae order: Diptera. The study was involved the most important taxonomic external characters of the: head, thorax, abdomen and their appendages which are: antenna, maxillary palp, wings, legs, spotting in coloring pattern and female genitalia of abdomen

Publication Date
Mon Aug 18 2025
Journal Name
Journal Of Genetic And Environment Conservation
Ultrasound application as a new green technology for preservation of table eggs: A review
...Show More Authors

In recent years, there has been a significant increase in research demonstrating the new and diverse uses of non-thermal food processing technologies, including more efficient mixing and blending processes, faster energy and mass transfer, lower temperature and selective extraction, reduced thermal and concentration gradients, reduced equipment size, faster response to extraction control, faster start-up, increased production, and a reduction in the number of steps in preparation and processing. Applications of ultrasound technology have indicated that this technology has a promising and significant future in the food industry and preservation, and there is a wide scope for its use due to the higher purity of final products and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
New Synthesis of Cyclic Imide Compounds for Ampicillin Drug and Studying Their Biological Activity
...Show More Authors

Some new cyclic imides are prepared by the reaction of ampicillin drug with different cyclic anhydrides as a first step to form amic acids for ampicillin drug. The second step includes the reaction of prepared amic acids with acetic anhydride and anhydrous sodium acetate with heating in THF as a solvent to give cyclic imide compounds. These compounds are identified by melting points, FT-IR, 1H-NMR, and biological activity

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A New Fractal Printed Dipole Antenna Based on Tent Transformations for Wireless Communication Applications
...Show More Authors

In this paper, a compact multiband printed dipole antenna is presented as a candidate for use in wireless communication applications. The proposed fractal antenna design is based on the second level tent transformation. The space-filling property of this fractal geometry permits producing longer lengths in a more compact size. Theoretical performance of this antenna has been calculated using the commercially available software IE3D from Zeland Software Inc. This electromagnetic simulator is based on the method of moments (MoM). The proposed dipole antenna has been found to possess a considerable size reduction compared with the conventional printed or wire dipole antenna designed at the same design frequency and using the same substrate

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
New Approaches of Cloud Services Access using Tonido Cloud Server for Real-Time Applications
...Show More Authors

A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 15 2023
Journal Name
Romanian Neurosurgery
Sellar hematoma as a new potential radiological clue for superior hypophyseal artery aneurysm rupture
...Show More Authors

Background. In cases of spontaneous subarachnoid haemorrhage (SAH) with multiple intracranial aneurysms (MIAs) detected on angiography, some radiological clues assist in determining the site of a ruptured aneurysm which is bleeding is quite beneficial for the selection of the best treatment strategy. Case description. We report a case of a 60 years old patient who presented with spontaneous SAH, sellar hematoma, and three different aneurysms detected in angiography. Although the right Posterior communicating artery (PcomA) aneurysms showed Murphy’s teat on angiography intraoperatively, we discovered that the right superior hypophyseal aneurysm (SHA) was the source of the index bleeding. Both aneurysms were clipped successfully. Co

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
New Trends in Teaching and Learning Theory Dr. Jasim Muhammad Abdul- Slamy
...Show More Authors

New trends in teaching and learning theory are considered a theoretical axis
from which came the background that depends on any source, or practice sample or
teaching plane, accuracy and simplicity prevent the development of the teaching
process. Many attempts have come to scene to illuminate the teaching background,
but they have not exceed those remarkable patterns and methods. Thus, the
appearance of the teaching theory have been hindered.
This led to the need for research and development in the field of teaching to
find out a specific teaching theory according to the modern trends and concepts.
Teaching is regarded a humanitarian process which aims at helping those who
want to acquire knowledge, since teach

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 30 2011
Journal Name
Al-kindy College Medical Journal
The Role of the Use of Low Molecular Weight Heparin in the Prevention of Deep Venous Thrombosis after Total Knee Arthroplasty
...Show More Authors

Background A prospective clinical study was
performed to compare the efficacy of the use of lowmolecular-
weight heparin group (enoxparin group)
with control group in the prevention of deep-vein
thrombosis after total knee arthroplasty.
Aim of the study: to assess the prevalence of DVT
after total knee arthroplasty and evaluate the
importance of the use of low molecular weight
heparin in the prevention of this DVT.
Methods Thirty-three patients undergoing total
knee arthroplasty were randomly divided into two
groups. One group consisted of 12 patients who
received no prophylaxis with an anticoagulant (the
control group), other group consisted of 21 patients
who received the low-molecular-weight h

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 25 2020
Journal Name
International Journal Of Drug Delivery Technology
Detection of Single Nucleotide Polymorphisms (SNPs) for Genes Cause Drug-Resistant in Iraqi Mycobacterium Tuberculosis isolates by new Pyrophosphate Technique.
...Show More Authors

In this search, a new pyrophosphate technique was proved. The technique was employed to single- nucleotide polymorphisms (SNPs), which diagnosis using a one-base extension reaction. Three Mycobacterium tuberculosis genes were chosen (Rpob, InhA, KatG) genes. Fifty-four specimens were used in this study fifty-three proved as drug-resistant specimens by The Iraqi Institute of Chest and Respiratory Diseases in Baghdad.; also one specimen was used as a negative control. The steps of this technique were by used a specific primer within each aliquot that has a short 3-OH end of the base of the target gene that was hybridized to the single-stranded DNA template. Then, the Taq polymerase enzyme and one of either α-thio-dATP, dTTP, dGTP, or dCTP

... Show More
Crossref