Preferred Language
Articles
/
bsj-8413
A Study on Nψβ and Nβψ - Closed sets in Neutrosophic Topological spaces
...Show More Authors

The aim of this paper is to introduce the concept of N  and Nβ -closed sets in terms of neutrosophic topological spaces. Some of its properties are also discussed.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 30 2024
Journal Name
مجلة دراسات دولية
العوامل المؤثرة على اتجاهات الناخبات في العراق دراسة ميدانية
...Show More Authors

تهدف هذه الد ا رسة الى التعرف على السلوك التصويتي للمقترعات الع ا رقيات. والأسباب التي تدفعهن للمشاركة في عملية الاقت ا رع، والعوامل المؤثرة في خيا ا رتهن التصويتية والأسباب التي تجعلها تفضل اختيار الرجل أو اختيار ام أ ر ة ، وأخي ا رً مدى م ا رعاة اج ا رءات الاقت ا رع لظروف النساء واحتياجاتهن واهتماماتهن. اعتم دتالد ا رسة منهجاً وصفياً واستعان ت بطريقة المسح بالعينةاما الاداة الرئيسية فهي الاستمارة الاستبيانية.

... Show More
Publication Date
Thu Dec 13 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Study of the Relationship between Some Microorganism Isolated from Congenital Anomalies Neonatal Screening and Their Mothers in Iraqi Patient
...Show More Authors

Objectives : This study was seeks to determine the IgG and IgM in serum mothers and their babies of Iraqi patient suffering from congenital anomalies toward some microorganisms such as Cytomegalovirus (CMV), Congenital toxoplasmosis , Congenital rubella and Genital herpes simplex virus (HSV) correlated with age and babies gender the sample was collected from AL- Alwayia hospital for children / Baghdad . Methodology : Fifth blood sample have been collected from mothers and their babies suffering from congenital anomalies to detection IgG and IgM of some viruses including as Cytomegalovirus (CMV), congenital tox

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Political Sciences Journal
Political behavior for generations (Iraq's case study)
...Show More Authors

The topic area of that’s research dealing with values which adopted by Iraqi people since 1980, many changes and variables which make many situations and skills which the life is suitable in war and conflicts times. That’s values like traditional and ordering, traditionalism mean the conservation about values s and tradition which society adopted its. The Iraqi society suffering from many changes since 1980-2003, the consequently of that’s changes make Iraqi citizen more interested about luxury needs like clothes, while decreasing the interested about liberty of thought, beauty, show evidence of identity, and openness of mind. The processing of values changes associated with political behavior of Iraqi people which lead to weaken o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Al–bahith Al–a'alami
Indicators of Mental image among Students of the University of Baghdad about Iraqi Political Parties-(a research based on a master thesis)
...Show More Authors

Media studies have focused mostly on the issue of the mental image because the image that is formed in the mind has become not only a photo of a human being and having kept for himself. This image has an outside influence which may sometimes up to the formation of the fate of others and it sometimes includes individuals and groups together.
This study comes in the context of identifying the image of Iraqi political parties among Iraqi university students and the nature of the view that students have in their minds about these parties.
Chapter one includes the problem of the research, the importance of the study, the goals and method used. Chapter two is divided into two sections: section one deals with the concept of the mental i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Studying the Factors Effect on the Flowability of (ZnO – CuO/ Al2O3) Catalyst with Blending of Different Lubricants through Hopper
...Show More Authors

One of the most important problems in tablet process is to control the flow of the catalyst through the hopper; Controlling the flow can be done either by changing the size of particles or added the different lubricant (stearic acid, starch, graphite) or blending of different lubricants. The study showed that we can control (increase or decrease) on the flow of the catalyst through the hopper by blending different lubricants for the constant percentage. The flow increasing when particles size (0.6 mm) and then decrease with or without lubricants, no effect on flow when particles size lower than (0.2 mm) with use that lubricants, and good flow on (0.4 mm) when use stearic acid and starch.

View Publication Preview PDF
Publication Date
Mon Dec 01 2025
Journal Name
Journal Of Kufa For Chemical Sciences
Miscellaneous Azo Dyes: A Review on Recent Advancements and Applications
...Show More Authors

The dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on leather

... Show More
Preview PDF
Crossref
Publication Date
Mon Dec 01 2025
Journal Name
Journal Of Kufa For Chemical Sciences
Miscellaneous Azo Dyes: A Review on Recent Advancements and Applications
...Show More Authors

The dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on

... Show More
View Publication
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
2019 2nd International Conference On Engineering Technology And Its Applications (iiceta)
A Survey on Linguistic Interpretation of Facial Expressions and Technologies
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref